INFO: task kworker/0:1:10 blocked for more than 450 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:10 tgid:10 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df841d84 r8:00000002 r7:60000113 r6:df841d8c r5:8323ec00 r4:8323ec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8323ec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df841e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bce340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8323ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9d3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb2b8c r4:84bb2800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bb2b8c r4:830b8500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8323ec00 r8:830b852c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8500 r8:8027ed34 r7:df83de60 r6:830b8600 r5:8323ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf841fb0 to 0xdf841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:830b6180 INFO: task kworker/0:1:10 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: a76fd000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 INFO: task kworker/0:2:43 blocked for more than 450 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df911d84 r8:00000002 r7:60000113 r6:df911d8c r5:833aa400 r4:833aa400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:833aa400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df911e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522f300 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:833aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4c1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599ef8c r4:8599ec00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8599ef8c r4:83363680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833aa400 r8:833636ac r7:82804d40 r6:dddced40 r5:dddced60 r4:83363680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83363680 r8:8027ed34 r7:df83de60 r6:83363700 r5:833aa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8333e9c0 INFO: task kworker/0:2:43 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b34d0000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 INFO: task kworker/1:5:3120 blocked for more than 450 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3120 tgid:3120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9d1d84 r8:00000002 r7:60000113 r6:df9d1d8c r5:8413e000 r4:8413e000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8413e000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85086f40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8413e000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9b5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb378c r4:84bb3400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb378c r4:84786900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8413e000 r8:8478692c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84786900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84786900 r8:8027ed34 r7:df9a1e60 r6:84786400 r5:8413e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d1fb0 to 0xdf9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84761140 INFO: task kworker/1:5:3120 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 INFO: task kworker/0:0:3122 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:3122 tgid:3122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df95dd84 r8:00000002 r7:60000113 r6:df95dd8c r5:84139800 r4:84139800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84139800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df95de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfb4c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84139800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb93000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85060b8c r4:85060800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85060b8c r4:842b3b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84139800 r8:842b3bac r7:82804d40 r6:dddced40 r5:dddced60 r4:842b3b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842b3b80 r8:8027ed34 r7:df841e60 r6:84786c00 r5:84139800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf95dfb0 to 0xdf95dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84895040 INFO: task kworker/0:0:3122 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 INFO: task kworker/0:3:3123 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9e5d84 r8:00000002 r7:60000013 r6:df9e5d8c r5:8413b000 r4:8413b000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8413b000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6d840 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8413b000 r7:00000000 r6:83018000 r5:00001000 r4:7f011000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df967000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85062b8c r4:85062800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85062b8c r4:842b3b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8413b000 r8:842b3b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:842b3b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842b3b00 r8:8027ed34 r7:df95de60 r6:84786800 r5:8413b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84895040 INFO: task kworker/0:3:3123 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 INFO: task kworker/1:6:3124 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3124 tgid:3124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df99dd84 r8:00000002 r7:60000113 r6:df99dd8c r5:8413d400 r4:8413d400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8413d400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df99de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523f040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8413d400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0683000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8493538c r4:84935000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8493538c r4:84786300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8413d400 r8:8478632c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84786300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84786300 r8:8027ed34 r7:df9d1e60 r6:84786b80 r5:8413d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf99dfb0 to 0xdf99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84761200 INFO: task kworker/1:6:3124 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 INFO: task kworker/0:4:3125 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3125 tgid:3125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9f1d84 r8:00000002 r7:60000113 r6:df9f1d8c r5:8413ec00 r4:8413ec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8413ec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516ab80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8413ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f011000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9c5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85261f8c r4:85261c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85261f8c r4:838a2100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8413ec00 r8:838a212c r7:82804d40 r6:dddced40 r5:dddced60 r4:838a2100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838a2100 r8:8027ed34 r7:df9e5e60 r6:84786000 r5:8413ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84895040 INFO: task kworker/0:4:3125 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 INFO: task kworker/1:7:3126 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9f5d84 r8:00000002 r7:60000113 r6:df9f5d8c r5:8324a400 r4:8324a400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8324a400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85172b80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8324a400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0611000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e8f8c r4:850e8c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850e8f8c r4:84786880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324a400 r8:847868ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84786880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84786880 r8:8027ed34 r7:df99de60 r6:84786980 r5:8324a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84761400 INFO: task kworker/1:7:3126 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 INFO: task kworker/0:5:3127 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3127 tgid:3127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9e1d84 r8:00000002 r7:60000113 r6:df9e1d8c r5:83a66000 r4:83a66000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a66000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518acc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83a66000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8817000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526078c r4:85260400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8526078c r4:838a2080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a66000 r8:838a20ac r7:82804d40 r6:dddced40 r5:dddced60 r4:838a2080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838a2080 r8:8027ed34 r7:df9f1e60 r6:843f0780 r5:83a66000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e1fb0 to 0xdf9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84895040 INFO: task kworker/0:5:3127 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 INFO: task kworker/1:8:3129 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3129 tgid:3129 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa05d84 r8:00000002 r7:60000113 r6:dfa05d8c r5:83c53000 r4:83c53000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83c53000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84761600 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83c53000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff51000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e978c r4:850e9400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850e978c r4:830cd100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83c53000 r8:830cd12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:830cd100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd100 r8:8027ed34 r7:df99de60 r6:830cd080 r5:83c53000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa05fb0 to 0xdfa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84761640 INFO: task kworker/1:8:3129 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3131 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa09d84 r8:00000002 r7:60000113 r6:dfa09d8c r5:83865400 r4:83865400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83865400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa09e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243a40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83865400 r7:00000000 r6:83018200 r5:00001000 r4:7f011000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df987000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850eb78c r4:850eb400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850eb78c r4:8449de00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83865400 r8:8449de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8449de00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8449de00 r8:8027ed34 r7:df99de60 r6:84286a80 r5:83865400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa09fb0 to 0xdfa09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84761640 INFO: task kworker/1:9:3131 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3133 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3133 tgid:3133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9fdd84 r8:00000002 r7:60000113 r6:df9fdd8c r5:83864800 r4:83864800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83864800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9fde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5cf80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83864800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0623000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b738c r4:852b7000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852b738c r4:8449de80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83864800 r8:8449deac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8449de80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8449de80 r8:8027ed34 r7:df99de60 r6:84286b00 r5:83864800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9fdfb0 to 0xdf9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847618c0 INFO: task kworker/1:10:3133 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:6:3136 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3136 tgid:3136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa19d84 r8:00000002 r7:60000113 r6:dfa19d8c r5:83a53000 r4:83a53000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a53000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa19e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd2640 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83a53000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05f1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526338c r4:85263000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8526338c r4:838b0b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a53000 r8:838b0b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:838b0b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838b0b00 r8:8027ed34 r7:df9f1e60 r6:838b0c80 r5:83a53000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa19fb0 to 0xdfa19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84895700 INFO: task kworker/0:6:3136 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:7:3137 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa25d84 r8:00000002 r7:60000013 r6:dfa25d8c r5:83240c00 r4:83240c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83240c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa25e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84977a40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83240c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeab000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85263b8c r4:85263800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85263b8c r4:838b0c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83240c00 r8:838b0c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:838b0c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838b0c00 r8:8027ed34 r7:dfa19e60 r6:832a0180 r5:83240c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa25fb0 to 0xdfa25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84895540 INFO: task kworker/0:7:3137 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:8:3139 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa2dd84 r8:00000002 r7:60000113 r6:dfa2dd8c r5:83ff1800 r4:83ff1800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ff1800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa2de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522f5c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83ff1800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5ab000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599f78c r4:8599f400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8599f78c r4:830b8780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ff1800 r8:830b87ac r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8780 r8:8027ed34 r7:dfa25e60 r6:830b8700 r5:83ff1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa2dfb0 to 0xdfa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848957c0 INFO: task kworker/0:8:3139 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3143 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3143 tgid:3143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa55d84 r8:00000002 r7:60000113 r6:dfa55d8c r5:83ff3c00 r4:83ff3c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ff3c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa55e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d7e40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83ff3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05a9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545db8c r4:8545d800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8545db8c r4:84884000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ff3c00 r8:8488402c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884000 r8:8027ed34 r7:df99de60 r6:830b8480 r5:83ff3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa55fb0 to 0xdfa55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84761e80 INFO: task kworker/1:11:3143 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3144 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa5dd84 r8:00000002 r7:60000013 r6:dfa5dd8c r5:83ff2400 r4:83ff2400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ff2400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa5de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84895e40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83ff2400 r7:00000000 r6:83018000 r5:00001000 r4:7f011000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa47000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538378c r4:85383400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8538378c r4:830b8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ff2400 r8:830b842c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:8027ed34 r7:dfa2de60 r6:8479be00 r5:83ff2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa5dfb0 to 0xdfa5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84895900 INFO: task kworker/0:9:3144 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3146 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:83ff0c00 r4:83ff0c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ff0c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85244740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83ff0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa11000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84934f8c r4:84934c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84934f8c r4:84884080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ff0c00 r8:848840ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884080 r8:8027ed34 r7:dfa55e60 r6:847a9000 r5:83ff0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa65fb0 to 0xdfa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84761f00 INFO: task kworker/1:12:3146 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3147 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3147 tgid:3147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa69d84 r8:00000002 r7:60000113 r6:dfa69d8c r5:83ff0000 r4:83ff0000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ff0000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa69e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b6440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83ff0000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e009f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a6f8c r4:853a6c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853a6f8c r4:84884100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ff0000 r8:8488412c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884100 r8:8027ed34 r7:dfa55e60 r6:847a9080 r5:83ff0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa69fb0 to 0xdfa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84761f00 INFO: task kworker/1:13:3147 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3150 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa85d84 r8:00000002 r7:60000113 r6:dfa85d8c r5:83ff4800 r4:83ff4800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ff4800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa85e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c73c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83ff4800 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb233000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536ff8c r4:8536fc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8536ff8c r4:84884180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ff4800 r8:848841ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884180 r8:8027ed34 r7:dfa55e60 r6:847a9100 r5:83ff4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa85fb0 to 0xdfa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84890280 INFO: task kworker/1:14:3150 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3152 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa91d84 r8:00000002 r7:60000113 r6:dfa91d8c r5:83ff6000 r4:83ff6000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ff6000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa91e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a3980 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83ff6000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e044b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85434f8c r4:85434c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85434f8c r4:84884200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ff6000 r8:8488422c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884200 r8:8027ed34 r7:dfa55e60 r6:847a9180 r5:83ff6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa91fb0 to 0xdfa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84890100 INFO: task kworker/1:15:3152 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3154 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa99d84 r8:00000002 r7:60000113 r6:dfa99d8c r5:83308c00 r4:83308c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83308c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa99e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552a2c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83308c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb509000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8543678c r4:85436400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8543678c r4:84884280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308c00 r8:848842ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884280 r8:8027ed34 r7:dfa55e60 r6:847a9200 r5:83308c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa99fb0 to 0xdfa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84890200 INFO: task kworker/1:16:3154 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b572d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3155 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3155 tgid:3155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfaa5d84 r8:00000002 r7:60000113 r6:dfaa5d8c r5:84142400 r4:84142400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84142400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522f440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84142400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4df000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599f38c r4:8599f000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8599f38c r4:847a9280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84142400 r8:847a92ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a9280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9280 r8:8027ed34 r7:dfa2de60 r6:847a9300 r5:84142400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:844b4200 INFO: task kworker/0:10:3155 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b5ae7000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3157 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3157 tgid:3157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfaadd84 r8:00000002 r7:60000113 r6:dfaadd8c r5:844fb000 r4:844fb000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844fb000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaade08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552af80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0625000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85436b8c r4:85436800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85436b8c r4:84884300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844fb000 r8:8488432c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884300 r8:8027ed34 r7:dfa55e60 r6:847a9380 r5:844fb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaadfb0 to 0xdfaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848903c0 INFO: task kworker/1:17:3157 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b5ae7000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3159 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3159 tgid:3159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfab9d84 r8:00000002 r7:60000113 r6:dfab9d8c r5:844fbc00 r4:844fbc00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844fbc00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85643840 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb68d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84938f8c r4:84938c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84938f8c r4:84884380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844fbc00 r8:848843ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884380 r8:8027ed34 r7:dfa55e60 r6:847a9400 r5:844fbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab9fb0 to 0xdfab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84890500 INFO: task kworker/1:18:3159 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b5ae7000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3161 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3161 tgid:3161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfac9d84 r8:00000002 r7:60000113 r6:dfac9d8c r5:844fd400 r4:844fd400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844fd400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85643600 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0441000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8493938c r4:84939000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8493938c r4:84884400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844fd400 r8:8488442c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884400 r8:8027ed34 r7:dfa55e60 r6:847a9480 r5:844fd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac9fb0 to 0xdfac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84890640 INFO: task kworker/1:19:3161 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b5ae7000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3163 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfad5d84 r8:00000002 r7:60000113 r6:dfad5d8c r5:83300000 r4:83300000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83300000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85671f00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83300000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06ff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545c78c r4:8545c400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8545c78c r4:84884480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83300000 r8:848844ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884480 r8:8027ed34 r7:dfa55e60 r6:847a9500 r5:83300000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad5fb0 to 0xdfad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84890780 INFO: task kworker/1:20:3163 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b5ae7000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3165 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfae5d84 r8:00000002 r7:60000113 r6:dfae5d8c r5:83306000 r4:83306000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83306000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85817280 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83306000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa91000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a138c r4:856a1000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856a138c r4:84884500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83306000 r8:8488452c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884500 r8:8027ed34 r7:dfa55e60 r6:847a9580 r5:83306000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae5fb0 to 0xdfae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848908c0 INFO: task kworker/1:21:3165 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b5ae7000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3167 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa39d84 r8:00000002 r7:60000113 r6:dfa39d8c r5:83c53c00 r4:83c53c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83c53c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa39e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8579b400 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83c53c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb6d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85754b8c r4:85754800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85754b8c r4:84884580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83c53c00 r8:848845ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884580 r8:8027ed34 r7:dfae5e60 r6:84884600 r5:83c53c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa39fb0 to 0xdfa39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848909c0 INFO: task kworker/1:22:3167 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b5ae7000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3170 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfaf9d84 r8:00000002 r7:60000113 r6:dfaf9d8c r5:83c54800 r4:83c54800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83c54800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857901c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83c54800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec471000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a078c r4:856a0400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856a078c r4:84884680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83c54800 r8:848846ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884680 r8:8027ed34 r7:dfae5e60 r6:84884700 r5:83c54800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84890f40 INFO: task kworker/1:23:3170 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b5ae7000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3173 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3173 tgid:3173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb0dd84 r8:00000002 r7:60000113 r6:dfb0dd8c r5:83a76c00 r4:83a76c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a76c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb0de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84891f40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83a76c00 r7:00000000 r6:83018200 r5:00001000 r4:7f011000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb03000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a238c r4:856a2000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856a238c r4:84884780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a76c00 r8:848847ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884780 r8:8027ed34 r7:dfae5e60 r6:84884800 r5:83a76c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb0dfb0 to 0xdfb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84895c80 INFO: task kworker/1:24:3173 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b5ae7000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3174 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa45d84 r8:00000002 r7:60000113 r6:dfa45d8c r5:849a0000 r4:849a0000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849a0000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa45e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84891bc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4bb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a178c r4:856a1400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856a178c r4:84884880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a0000 r8:848848ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884880 r8:8027ed34 r7:dfb0de60 r6:84884900 r5:849a0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa45fb0 to 0xdfa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84895c80 INFO: task kworker/1:25:3174 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b5ae7000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3176 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb15d84 r8:00000002 r7:60000113 r6:dfb15d8c r5:849a0c00 r4:849a0c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849a0c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85083f40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb3f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8493b78c r4:8493b400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8493b78c r4:84884980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a0c00 r8:848849ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884980 r8:8027ed34 r7:dfb0de60 r6:84884a00 r5:849a0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb15fb0 to 0xdfb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848aa000 INFO: task kworker/1:26:3176 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b78c7000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3178 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3178 tgid:3178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb21d84 r8:00000002 r7:60000113 r6:dfb21d8c r5:849a1800 r4:849a1800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849a1800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb21e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85900f40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec41d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8493b38c r4:8493b000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8493b38c r4:84884a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a1800 r8:84884aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884a80 r8:8027ed34 r7:dfb15e60 r6:84884b00 r5:849a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb21fb0 to 0xdfb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848aa180 INFO: task kworker/1:27:3178 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b808f000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3179 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb29d84 r8:00000002 r7:60000113 r6:dfb29d8c r5:849a2400 r4:849a2400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849a2400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb29e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d9d80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb929000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599d38c r4:8599d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8599d38c r4:84884b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a2400 r8:84884bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884b80 r8:8027ed34 r7:dfb15e60 r6:84884c00 r5:849a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb29fb0 to 0xdfb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848aa180 INFO: task kworker/1:28:3179 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b8387000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:29:3182 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:3182 tgid:3182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb3dd84 r8:00000002 r7:60000113 r6:dfb3dd8c r5:849a3c00 r4:849a3c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849a3c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb3de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dfa00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb991000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858baf8c r4:858bac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858baf8c r4:84884c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a3c00 r8:84884cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884c80 r8:8027ed34 r7:dfb29e60 r6:84884d00 r5:849a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb3dfb0 to 0xdfb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848aa480 INFO: task kworker/1:29:3182 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b8631000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:30:3183 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:30 state:D stack:0 pid:3183 tgid:3183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb49d84 r8:00000002 r7:60000113 r6:dfb49d8c r5:83302400 r4:83302400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83302400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb49e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ba600 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83302400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3c9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c078c r4:858c0400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858c078c r4:84884d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83302400 r8:84884dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884d80 r8:8027ed34 r7:dfb3de60 r6:847a9600 r5:83302400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb49fb0 to 0xdfb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848aa480 INFO: task kworker/1:30:3183 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b89cf000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3186 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3186 tgid:3186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb5dd84 r8:00000002 r7:60000113 r6:dfb5dd8c r5:83305400 r4:83305400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83305400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb5de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a0d8c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83305400 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec611000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1df8c r4:85a1dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a1df8c r4:84884e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83305400 r8:84884eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884e80 r8:8027ed34 r7:dfb49e60 r6:847a9680 r5:83305400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb5dfb0 to 0xdfb5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848aa880 INFO: task kworker/1:31:3186 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b89cf000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:32:3188 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:32 state:D stack:0 pid:3188 tgid:3188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb69d84 r8:00000002 r7:60000113 r6:dfb69d8c r5:83301800 r4:83301800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83301800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb69e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d8a40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83301800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3a7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c138c r4:858c1000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858c138c r4:84884f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83301800 r8:84884f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884f00 r8:8027ed34 r7:dfb5de60 r6:847a9700 r5:83301800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb69fb0 to 0xdfb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848aabc0 INFO: task kworker/1:32:3188 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: b9676000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:3190 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:3190 tgid:3190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb6dd84 r8:00000002 r7:60000113 r6:dfb6dd8c r5:84508c00 r4:84508c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84508c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb6de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576c440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84508c00 r7:00000000 r6:83018200 r5:00001000 r4:7f191000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc11000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c238c r4:858c2000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858c238c r4:84884f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84508c00 r8:84884fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84884f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84884f80 r8:8027ed34 r7:dfb69e60 r6:847a9780 r5:84508c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb6dfb0 to 0xdfb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848aa980 INFO: task kworker/1:33:3190 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: bb290000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3192 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb81d84 r8:00000002 r7:60000113 r6:dfb81d8c r5:8450a400 r4:8450a400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8450a400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a65c40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8450a400 r7:00000000 r6:83018200 r5:00001000 r4:7f20f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdd7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a43f8c r4:85a43c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a43f8c r4:849af080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8450a400 r8:849af0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849af080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849af080 r8:8027ed34 r7:dfb6de60 r6:847a9800 r5:8450a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb81fb0 to 0xdfb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848aac40 INFO: task kworker/1:34:3192 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: bbdb5000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:3193 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb61d84 r8:00000002 r7:60000113 r6:dfb61d8c r5:849a5400 r4:849a5400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849a5400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb61e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848aad80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb59000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c3f8c r4:858c3c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858c3f8c r4:849af000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a5400 r8:849af02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849af000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849af000 r8:8027ed34 r7:dfb81e60 r6:849af100 r5:849a5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb61fb0 to 0xdfb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848aac40 INFO: task kworker/1:35:3193 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: bbdb5000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:36:3197 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:36 state:D stack:0 pid:3197 tgid:3197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb79d84 r8:00000002 r7:60000113 r6:dfb79d8c r5:849a6000 r4:849a6000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849a6000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb79e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84add440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f297000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecde1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8493df8c r4:8493dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8493df8c r4:849af180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a6000 r8:849af1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849af180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849af180 r8:8027ed34 r7:dfb81e60 r6:849af200 r5:849a6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb79fb0 to 0xdfb79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84890fc0 INFO: task kworker/1:36:3197 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: bca70000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:37:3198 blocked for more than 453 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:37 state:D stack:0 pid:3198 tgid:3198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb51d84 r8:00000002 r7:60000113 r6:dfb51d8c r5:849a6c00 r4:849a6c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849a6c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb51e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85808200 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb75000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8493db8c r4:8493d800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8493db8c r4:849af280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a6c00 r8:849af2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849af280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849af280 r8:8027ed34 r7:dfb79e60 r6:849af300 r5:849a6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb51fb0 to 0xdfb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84890fc0 INFO: task kworker/1:37:3198 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: bca70000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:38:3200 blocked for more than 453 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:38 state:D stack:0 pid:3200 tgid:3200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb99d84 r8:00000002 r7:60000013 r6:dfb99d8c r5:849a3000 r4:849a3000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849a3000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb99e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856703c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec649000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b50f8c r4:85b50c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b50f8c r4:849af400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a3000 r8:849af42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849af400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849af400 r8:8027ed34 r7:dfb79e60 r6:849af480 r5:849a3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb99fb0 to 0xdfb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ade280 INFO: task kworker/1:38:3200 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: bcedd000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:39:3202 blocked for more than 453 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:39 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfba5d84 r8:00000002 r7:60000113 r6:dfba5d8c r5:849a4800 r4:849a4800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849a4800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84addd00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb8d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8493e38c r4:8493e000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8493e38c r4:849af380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a4800 r8:849af3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849af380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849af380 r8:8027ed34 r7:dfb99e60 r6:849af500 r5:849a4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba5fb0 to 0xdfba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ade0c0 INFO: task kworker/1:39:3202 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: bf9d7000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3207 blocked for more than 453 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3207 tgid:3207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbb9d84 r8:00000002 r7:60000013 r6:dfbb9d8c r5:8450c800 r4:8450c800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8450c800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522fa40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8450c800 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec673000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859a478c r4:859a4400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859a478c r4:847a9880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8450c800 r8:847a98ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a9880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9880 r8:8027ed34 r7:dfa2de60 r6:847a9900 r5:8450c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb9fb0 to 0xdfbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae70c0 INFO: task kworker/0:11:3207 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: bfed2000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3208 blocked for more than 453 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbadd84 r8:00000002 r7:60000113 r6:dfbadd8c r5:8450bc00 r4:8450bc00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8450bc00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbade08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522f740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8450bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec633000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599fb8c r4:8599f800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8599fb8c r4:847a9980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8450bc00 r8:847a99ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a9980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9980 r8:8027ed34 r7:dfbb9e60 r6:847a9a00 r5:8450bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbadfb0 to 0xdfbadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae70c0 INFO: task kworker/0:12:3208 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c02dc000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3210 blocked for more than 453 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbbdd84 r8:00000002 r7:60000013 r6:dfbbdd8c r5:8450d400 r4:8450d400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8450d400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbbde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522f940 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8450d400 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec659000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859a438c r4:859a4000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859a438c r4:847a9a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8450d400 r8:847a9aac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a9a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9a80 r8:8027ed34 r7:dfbb9e60 r6:847a9b00 r5:8450d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbbdfb0 to 0xdfbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae7200 INFO: task kworker/0:13:3210 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c13c6000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:40:3212 blocked for more than 453 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:40 state:D stack:0 pid:3212 tgid:3212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbc5d84 r8:00000002 r7:60000113 r6:dfbc5d8c r5:84508000 r4:84508000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84508000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fa840 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84508000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb9b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c05b8c r4:85c05800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c05b8c r4:849af580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84508000 r8:849af5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849af580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849af580 r8:8027ed34 r7:dfb99e60 r6:847a9b80 r5:84508000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc5fb0 to 0xdfbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ade580 INFO: task kworker/1:40:3212 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c17af000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3213 blocked for more than 453 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3213 tgid:3213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbd9d84 r8:00000002 r7:60000113 r6:dfbd9d8c r5:84509800 r4:84509800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84509800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522fc80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84509800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6a1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859a4f8c r4:859a4c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859a4f8c r4:847a9c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84509800 r8:847a9c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a9c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9c00 r8:8027ed34 r7:dfbb9e60 r6:847a9c80 r5:84509800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd9fb0 to 0xdfbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae7580 INFO: task kworker/0:14:3213 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c1cdf000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3215 blocked for more than 453 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3215 tgid:3215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbd1d84 r8:00000002 r7:60000113 r6:dfbd1d8c r5:8450ec00 r4:8450ec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8450ec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522fac0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8450ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec683000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859a4b8c r4:859a4800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859a4b8c r4:847a9d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8450ec00 r8:847a9d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a9d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9d00 r8:8027ed34 r7:dfbd9e60 r6:847a9d80 r5:8450ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd1fb0 to 0xdfbd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae74c0 INFO: task kworker/0:15:3215 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c1cdf000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3220 blocked for more than 453 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3220 tgid:3220 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc01d84 r8:00000002 r7:60000013 r6:dfc01d8c r5:84922400 r4:84922400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84922400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc01e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522fe40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84922400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7db000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859a578c r4:859a5400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859a578c r4:847a9e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84922400 r8:847a9eac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a9e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9e80 r8:8027ed34 r7:dfbd9e60 r6:849af680 r5:84922400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc01fb0 to 0xdfc01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae7900 INFO: task kworker/0:16:3220 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c2092000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3222 blocked for more than 453 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3222 tgid:3222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc15d84 r8:00000002 r7:60000113 r6:dfc15d8c r5:84923000 r4:84923000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84923000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc15e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522fd00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84923000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6b1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859a538c r4:859a5000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859a538c r4:847a9f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84923000 r8:847a9f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a9f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9f00 r8:8027ed34 r7:dfc01e60 r6:849af700 r5:84923000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc15fb0 to 0xdfc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae7ac0 INFO: task kworker/0:17:3222 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c2309000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3223 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3223 tgid:3223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc19d84 r8:00000002 r7:60000113 r6:dfc19d8c r5:84921800 r4:84921800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84921800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc19e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854aec00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84921800 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec82d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b9b8c r4:858b9800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858b9b8c r4:847a9f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84921800 r8:847a9fac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a9f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a9f80 r8:8027ed34 r7:dfc01e60 r6:849af780 r5:84921800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc19fb0 to 0xdfc19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae7ac0 INFO: task kworker/0:18:3223 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c3102000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3225 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3225 tgid:3225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc25d84 r8:00000002 r7:60000113 r6:dfc25d8c r5:84920c00 r4:84920c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84920c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc25e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522ff40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84920c00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7ed000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859a5b8c r4:859a5800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859a5b8c r4:84ad8000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84920c00 r8:84ad802c r7:82804d40 r6:dddced40 r5:dddced60 r4:84ad8000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad8000 r8:8027ed34 r7:dfc19e60 r6:849af800 r5:84920c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc25fb0 to 0xdfc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae7f00 INFO: task kworker/0:19:3225 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c3102000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3227 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3227 tgid:3227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc2dd84 r8:00000002 r7:60000113 r6:dfc2dd8c r5:84923c00 r4:84923c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84923c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc2de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854be040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84923c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7fd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859a5f8c r4:859a5c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859a5f8c r4:84ad8080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84923c00 r8:84ad80ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ad8080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad8080 r8:8027ed34 r7:dfc19e60 r6:849af880 r5:84923c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc2dfb0 to 0xdfc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae7d80 INFO: task kworker/0:20:3227 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c4360000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3230 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3230 tgid:3230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc41d84 r8:00000002 r7:60000113 r6:dfc41d8c r5:84924800 r4:84924800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84924800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc41e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854be140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84924800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec817000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859a638c r4:859a6000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859a638c r4:84ad8100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84924800 r8:84ad812c r7:82804d40 r6:dddced40 r5:dddced60 r4:84ad8100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad8100 r8:8027ed34 r7:dfc19e60 r6:849af900 r5:84924800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc41fb0 to 0xdfc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849ae100 INFO: task kworker/0:21:3230 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c5c0f000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3231 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3231 tgid:3231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc45d84 r8:00000002 r7:60000113 r6:dfc45d8c r5:84926000 r4:84926000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84926000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc45e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854be900 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84926000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8fb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859a6b8c r4:859a6800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859a6b8c r4:84ad8180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84926000 r8:84ad81ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ad8180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad8180 r8:8027ed34 r7:dfc19e60 r6:849af980 r5:84926000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc45fb0 to 0xdfc45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849ae100 INFO: task kworker/0:22:3231 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c5c10000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3233 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3233 tgid:3233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc29d84 r8:00000002 r7:60000113 r6:dfc29d8c r5:84aa2400 r4:84aa2400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84aa2400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc29e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854be540 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84aa2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec85b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859a678c r4:859a6400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859a678c r4:84ad8200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aa2400 r8:84ad822c r7:82804d40 r6:dddced40 r5:dddced60 r4:84ad8200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad8200 r8:8027ed34 r7:dfc45e60 r6:84ad8280 r5:84aa2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc29fb0 to 0xdfc29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849ae200 INFO: task kworker/0:23:3233 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c5eb9000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:132:3497 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:132 state:D stack:0 pid:3497 tgid:3497 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfe69d84 r8:00000002 r7:60000013 r6:dfe69d8c r5:84b44800 r4:84b44800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b44800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe69e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bce540 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84b44800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848eb78c r4:848eb400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848eb78c r4:84bd5900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b44800 r8:84bd592c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd5900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd5900 r8:8027ed34 r7:dfe2de60 r6:84be5580 r5:84b44800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe69fb0 to 0xdfe69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be22c0 INFO: task kworker/0:132:3497 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c61f4000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:84:3544 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:84 state:D stack:0 pid:3544 tgid:3544 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffc9d84 r8:00000002 r7:60000113 r6:dffc9d8c r5:8500ec00 r4:8500ec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8500ec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffc9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85bc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0f8c r4:84bb0c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0f8c r4:84be0b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:84be0bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0b80 r8:8027ed34 r7:dffc5e60 r6:84be0c00 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85280 INFO: task kworker/1:84:3544 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c6fa8000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:134:3546 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:134 state:D stack:0 pid:3546 tgid:3546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffd1d84 r8:00000002 r7:60000113 r6:dffd1d8c r5:85010c00 r4:85010c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85010c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffd1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd8e40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85010c00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848eab8c r4:848ea800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848eab8c r4:84bd5a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85010c00 r8:84bd5a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd5a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd5a00 r8:8027ed34 r7:dfe69e60 r6:84be0c80 r5:85010c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd1fb0 to 0xdffd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2a80 INFO: task kworker/0:134:3546 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c830b000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:87:3552 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:87 state:D stack:0 pid:3552 tgid:3552 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffbdd84 r8:00000002 r7:60000013 r6:dffbdd8c r5:85013000 r4:85013000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85013000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffbde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85d40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85013000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfec3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb138c r4:84bb1000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb138c r4:84be0f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85013000 r8:84be0f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0f00 r8:8027ed34 r7:dffc9e60 r6:84be0f80 r5:85013000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffbdfb0 to 0xdffbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b80 INFO: task kworker/1:87:3552 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: c9d02000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:88:3554 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:88 state:D stack:0 pid:3554 tgid:3554 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffd9d84 r8:00000002 r7:60000013 r6:dffd9d8c r5:85014800 r4:85014800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85014800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffd9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b81100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85014800 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff0d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb1b8c r4:84bb1800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb1b8c r4:84b83000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85014800 r8:84b8302c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b83000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b83000 r8:8027ed34 r7:dffbde60 r6:84b83080 r5:85014800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd9fb0 to 0xdffd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85c80 INFO: task kworker/1:88:3554 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: ca418000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:135:3556 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:135 state:D stack:0 pid:3556 tgid:3556 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffddd84 r8:00000002 r7:60000113 r6:dffddd8c r5:8412c800 r4:8412c800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8412c800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffdde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bce040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8412c800 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfef9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848eaf8c r4:848eac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848eaf8c r4:84bd5a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8412c800 r8:84bd5aac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd5a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd5a80 r8:8027ed34 r7:dfe69e60 r6:84bd5b00 r5:8412c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffddfb0 to 0xdffddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd8500 INFO: task kworker/0:135:3556 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: caa89000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:89:3557 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:89 state:D stack:0 pid:3557 tgid:3557 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffe1d84 r8:00000002 r7:60000113 r6:dffe1d8c r5:85013c00 r4:85013c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85013c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffe1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcde40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85013c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb178c r4:84bb1400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb178c r4:84b83100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85013c00 r8:84b8312c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b83100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b83100 r8:8027ed34 r7:dffd9e60 r6:84b83180 r5:85013c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85fc0 INFO: task kworker/1:89:3557 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: cb412000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:136:3560 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:136 state:D stack:0 pid:3560 tgid:3560 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffe9d84 r8:00000002 r7:60000013 r6:dffe9d8c r5:85015400 r4:85015400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85015400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffe9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bce440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85015400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848eb38c r4:848eb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848eb38c r4:84bd5b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85015400 r8:84bd5bac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd5b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd5b80 r8:8027ed34 r7:dfe69e60 r6:84b83200 r5:85015400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe9fb0 to 0xdffe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bce000 INFO: task kworker/0:136:3560 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: cb412000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:90:3562 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:90 state:D stack:0 pid:3562 tgid:3562 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfff1d84 r8:00000002 r7:60000013 r6:dfff1d8c r5:85010000 r4:85010000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85010000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfff1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b81400 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85010000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb1f8c r4:84bb1c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb1f8c r4:84b83280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85010000 r8:84b832ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b83280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b83280 r8:8027ed34 r7:dffd9e60 r6:84b83300 r5:85010000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfff1fb0 to 0xdfff1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b810c0 INFO: task kworker/1:90:3562 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: cc5ba000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:91:3563 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:91 state:D stack:0 pid:3563 tgid:3563 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffedd84 r8:00000002 r7:60000113 r6:dffedd8c r5:85016000 r4:85016000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85016000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffede08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b81640 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85016000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfff7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb238c r4:84bb2000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb238c r4:84b83380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85016000 r8:84b833ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b83380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b83380 r8:8027ed34 r7:dfff1e60 r6:84b83400 r5:85016000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffedfb0 to 0xdffedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b813c0 INFO: task kworker/1:91:3563 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: cd4f2000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:92:3565 blocked for more than 454 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:92 state:D stack:0 pid:3565 tgid:3565 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfff5d84 r8:00000002 r7:60000113 r6:dfff5d8c r5:84b4d400 r4:84b4d400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84b4d400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfff5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84761000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84b4d400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfac3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b838c r4:850b8000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850b838c r4:84b83480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b4d400 r8:84b834ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b83480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b83480 r8:8027ed34 r7:dffede60 r6:84b83500 r5:84b4d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfff5fb0 to 0xdfff5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b813c0 INFO: task kworker/1:92:3565 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: ceb28000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:137:3571 blocked for more than 455 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:137 state:D stack:0 pid:3571 tgid:3571 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0009d84 r8:00000002 r7:60000013 r6:e0009d8c r5:85021800 r4:85021800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85021800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0009e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bce640 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85021800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb25000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ebb8c r4:848eb800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848ebb8c r4:84bd5c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85021800 r8:84bd5c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd5c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd5c00 r8:8027ed34 r7:dfe69e60 r6:84b83580 r5:85021800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0009fb0 to 0xe0009ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bce4c0 INFO: task kworker/0:137:3571 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: ced97000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:138:3573 blocked for more than 455 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:138 state:D stack:0 pid:3573 tgid:3573 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0011d84 r8:00000002 r7:60000013 r6:e0011d8c r5:85022400 r4:85022400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85022400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0011e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcea80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85022400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ec78c r4:848ec400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848ec78c r4:84bd5c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85022400 r8:84bd5cac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd5c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd5c80 r8:8027ed34 r7:e0009e60 r6:84b83600 r5:85022400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0011fb0 to 0xe0011ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bce5c0 INFO: task kworker/0:138:3573 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: cf0fe000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:139:3574 blocked for more than 455 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:139 state:D stack:0 pid:3574 tgid:3574 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0015d84 r8:00000002 r7:60000013 r6:e0015d8c r5:85023000 r4:85023000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85023000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0015e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bce700 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85023000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb4b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ebf8c r4:848ebc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848ebf8c r4:84bd5d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85023000 r8:84bd5d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd5d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd5d00 r8:8027ed34 r7:e0011e60 r6:84b83680 r5:85023000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0015fb0 to 0xe0015ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bce5c0 INFO: task kworker/0:139:3574 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: cf0fe000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:140:3576 blocked for more than 455 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:140 state:D stack:0 pid:3576 tgid:3576 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e001dd84 r8:00000002 r7:60000113 r6:e001dd8c r5:85020000 r4:85020000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85020000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e001de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bce880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85020000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb71000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84935f8c r4:84935c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84935f8c r4:84bd5d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85020000 r8:84bd5dac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd5d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd5d80 r8:8027ed34 r7:e0011e60 r6:84b83700 r5:85020000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe001dfb0 to 0xe001dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bce740 INFO: task kworker/0:140:3576 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: cf0fe000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:141:3580 blocked for more than 455 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:141 state:D stack:0 pid:3580 tgid:3580 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e002dd84 r8:00000002 r7:60000013 r6:e002dd8c r5:85023c00 r4:85023c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85023c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e002de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bce940 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85023c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb91000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ec38c r4:848ec000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848ec38c r4:84bd5e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85023c00 r8:84bd5e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd5e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd5e00 r8:8027ed34 r7:e0011e60 r6:84b83780 r5:85023c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe002dfb0 to 0xe002dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bce5c0 INFO: task kworker/0:141:3580 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: cf0fe000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:142:3581 blocked for more than 455 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:142 state:D stack:0 pid:3581 tgid:3581 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0005d84 r8:00000002 r7:60000013 r6:e0005d8c r5:8412d400 r4:8412d400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8412d400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0005e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84975380 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8412d400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc1f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ed38c r4:848ed000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848ed38c r4:84bd5e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8412d400 r8:84bd5eac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd5e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd5e80 r8:8027ed34 r7:e0011e60 r6:84bd5f00 r5:8412d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0005fb0 to 0xe0005ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bceac0 INFO: task kworker/0:142:3581 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: cf0fe000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:143:3583 blocked for more than 455 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:143 state:D stack:0 pid:3583 tgid:3583 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0031d84 r8:00000002 r7:60000013 r6:e0031d8c r5:8412e000 r4:8412e000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8412e000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0031e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcebc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8412e000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ecb8c r4:848ec800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848ecb8c r4:84bd5f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8412e000 r8:84bd5fac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd5f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd5f80 r8:8027ed34 r7:e0005e60 r6:84bc8000 r5:8412e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0031fb0 to 0xe0031ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bcec00 INFO: task kworker/0:143:3583 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: cf0fe000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:144:3585 blocked for more than 455 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:144 state:D stack:0 pid:3585 tgid:3585 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffe5d84 r8:00000002 r7:60000113 r6:dffe5d8c r5:8412b000 r4:8412b000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8412b000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffe5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bced00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8412b000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbef000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ecf8c r4:848ecc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848ecf8c r4:84bc8080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8412b000 r8:84bc80ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc8080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8080 r8:8027ed34 r7:e0005e60 r6:84bc8100 r5:8412b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe5fb0 to 0xdffe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bcec00 INFO: task kworker/0:144:3585 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: cf0fe000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:93:3586 blocked for more than 455 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:93 state:D stack:0 pid:3586 tgid:3586 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0039d84 r8:00000002 r7:60000013 r6:e0039d8c r5:8412bc00 r4:8412bc00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8412bc00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0039e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b81740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8412bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df849000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb278c r4:84bb2400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb278c r4:84b83800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8412bc00 r8:84b8382c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b83800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b83800 r8:8027ed34 r7:dfff5e60 r6:84bc8180 r5:8412bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0039fb0 to 0xe0039ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b81e40 INFO: task kworker/1:93:3586 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: cf0fe000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:145:3588 blocked for more than 455 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:145 state:D stack:0 pid:3588 tgid:3588 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0035d84 r8:00000002 r7:60000013 r6:e0035d8c r5:84129800 r4:84129800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84129800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0035e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2b80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84129800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc39000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ed78c r4:848ed400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848ed78c r4:84bc8200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84129800 r8:84bc822c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc8200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8200 r8:8027ed34 r7:e0005e60 r6:84bc8280 r5:84129800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2800 INFO: task kworker/0:145:3588 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: cf0fe000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:146:3590 blocked for more than 455 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:146 state:D stack:0 pid:3590 tgid:3590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e003dd84 r8:00000002 r7:60000013 r6:e003dd8c r5:8412ec00 r4:8412ec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8412ec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e003de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd7040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8412ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc67000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848edb8c r4:848ed800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848edb8c r4:84bc8300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8412ec00 r8:84bc832c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc8300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8300 r8:8027ed34 r7:e0035e60 r6:84bc8380 r5:8412ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe003dfb0 to 0xe003dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd7080 INFO: task kworker/0:146:3590 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: d15ba000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:147:3592 blocked for more than 455 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:147 state:D stack:0 pid:3592 tgid:3592 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0041d84 r8:00000002 r7:60000113 r6:e0041d8c r5:85016c00 r4:85016c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85016c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0041e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd7440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85016c00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcbb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ee38c r4:848ee000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848ee38c r4:84bc8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85016c00 r8:84bc842c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8400 r8:8027ed34 r7:e003de60 r6:84bc8480 r5:85016c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0041fb0 to 0xe0041ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd7300 INFO: task kworker/0:147:3592 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: d43d4000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:148:3593 blocked for more than 456 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:148 state:D stack:0 pid:3593 tgid:3593 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0049d84 r8:00000002 r7:60000013 r6:e0049d8c r5:84a25400 r4:84a25400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a25400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0049e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd71c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a25400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc93000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848edf8c r4:848edc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848edf8c r4:84bc8500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a25400 r8:84bc852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc8500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8500 r8:8027ed34 r7:e0041e60 r6:84bc8580 r5:84a25400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0049fb0 to 0xe0049ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd7300 INFO: task kworker/0:148:3593 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: d43d4000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:94:3595 blocked for more than 456 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:94 state:D stack:0 pid:3595 tgid:3595 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0051d84 r8:00000002 r7:60000113 r6:e0051d8c r5:85025400 r4:85025400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85025400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0051e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850862c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85025400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0475000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb2f8c r4:84bb2c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb2f8c r4:84b83880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85025400 r8:84b838ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b83880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b83880 r8:8027ed34 r7:dfff5e60 r6:84b83900 r5:85025400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0051fb0 to 0xe0051ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b81ec0 INFO: task kworker/1:94:3595 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: d793d000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:149:3597 blocked for more than 456 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:149 state:D stack:0 pid:3597 tgid:3597 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0059d84 r8:00000002 r7:60000013 r6:e0059d8c r5:85024800 r4:85024800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85024800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0059e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bced40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85024800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0095000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504838c r4:85048000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504838c r4:84bc8600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85024800 r8:84bc862c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc8600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8600 r8:8027ed34 r7:e0041e60 r6:84b83980 r5:85024800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0059fb0 to 0xe0059ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd7400 INFO: task kworker/0:149:3597 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: d7da6000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:150:3598 blocked for more than 456 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:150 state:D stack:0 pid:3598 tgid:3598 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e005dd84 r8:00000002 r7:60000113 r6:e005dd8c r5:85026000 r4:85026000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85026000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e005de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd7500 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85026000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfce1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ee78c r4:848ee400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848ee78c r4:84bc8680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85026000 r8:84bc86ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc8680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8680 r8:8027ed34 r7:e0059e60 r6:84b83a00 r5:85026000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe005dfb0 to 0xe005dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd7600 INFO: task kworker/0:150:3598 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: d7da6000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:151:3601 blocked for more than 456 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:151 state:D stack:0 pid:3601 tgid:3601 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0069d84 r8:00000002 r7:60000113 r6:e0069d8c r5:85028c00 r4:85028c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85028c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0069e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd7700 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85028c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff4f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848eeb8c r4:848ee800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848eeb8c r4:84bc8700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85028c00 r8:84bc872c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc8700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8700 r8:8027ed34 r7:e0059e60 r6:84b83a80 r5:85028c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0069fb0 to 0xe0069ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd7540 INFO: task kworker/0:151:3601 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: d7da6000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:152:3602 blocked for more than 456 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:152 state:D stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e006dd84 r8:00000002 r7:60000013 r6:e006dd8c r5:85029800 r4:85029800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85029800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e006de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd77c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85029800 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff5d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848eef8c r4:848eec00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848eef8c r4:84bc8780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85029800 r8:84bc87ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc8780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8780 r8:8027ed34 r7:e0059e60 r6:84b83b00 r5:85029800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe006dfb0 to 0xe006dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd7640 INFO: task kworker/0:152:3602 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: d862b000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:153:3604 blocked for more than 456 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:153 state:D stack:0 pid:3604 tgid:3604 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e007dd84 r8:00000002 r7:60000113 r6:e007dd8c r5:8502b000 r4:8502b000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8502b000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e007de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd7900 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8502b000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff6b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ef38c r4:848ef000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848ef38c r4:84bc8800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8502b000 r8:84bc882c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc8800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8800 r8:8027ed34 r7:e0059e60 r6:84b83b80 r5:8502b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd7800 INFO: task kworker/0:153:3604 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: d9662000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:154:3607 blocked for more than 456 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:154 state:D stack:0 pid:3607 tgid:3607 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0089d84 r8:00000002 r7:60000013 r6:e0089d8c r5:8502a400 r4:8502a400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8502a400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0089e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd7a40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8502a400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff75000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ef78c r4:848ef400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848ef78c r4:84bc8880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8502a400 r8:84bc88ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc8880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8880 r8:8027ed34 r7:e0059e60 r6:84b83c00 r5:8502a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0089fb0 to 0xe0089ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd7940 INFO: task kworker/0:154:3607 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: d9662000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:155:3608 blocked for more than 456 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:155 state:D stack:0 pid:3608 tgid:3608 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e008dd84 r8:00000002 r7:60000113 r6:e008dd8c r5:8502bc00 r4:8502bc00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8502bc00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e008de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd7c40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8502bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff83000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848efb8c r4:848ef800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848efb8c r4:84bc8900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8502bc00 r8:84bc892c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc8900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8900 r8:8027ed34 r7:e0059e60 r6:84b83c80 r5:8502bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe008dfb0 to 0xe008dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd7a80 INFO: task kworker/0:155:3608 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: d9935000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:156:3611 blocked for more than 456 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:156 state:D stack:0 pid:3611 tgid:3611 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e009dd84 r8:00000002 r7:60000113 r6:e009dd8c r5:85028000 r4:85028000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85028000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e009de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd7d40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85028000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0073000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848eff8c r4:848efc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848eff8c r4:84bc8980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85028000 r8:84bc89ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc8980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8980 r8:8027ed34 r7:e0059e60 r6:84b83d00 r5:85028000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe009dfb0 to 0xe009dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd7b80 INFO: task kworker/0:156:3611 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: d9e25000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:157:3612 blocked for more than 456 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:157 state:D stack:0 pid:3612 tgid:3612 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e00a5d84 r8:00000002 r7:60000013 r6:e00a5d8c r5:8502c800 r4:8502c800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8502c800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00a5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf1040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8502c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00a7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504878c r4:85048400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504878c r4:84bc8a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8502c800 r8:84bc8a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc8a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8a00 r8:8027ed34 r7:e0059e60 r6:84b83d80 r5:8502c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a5fb0 to 0xe00a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd7cc0 INFO: task kworker/0:157:3612 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: da543000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:158:3615 blocked for more than 456 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:158 state:D stack:0 pid:3615 tgid:3615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e00b5d84 r8:00000002 r7:60000113 r6:e00b5d8c r5:8502ec00 r4:8502ec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8502ec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00b5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf18c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8502ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0405000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504a38c r4:8504a000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504a38c r4:84bc8a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8502ec00 r8:84bc8aac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc8a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8a80 r8:8027ed34 r7:e00a5e60 r6:84b83e00 r5:8502ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00b5fb0 to 0xe00b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf1000 INFO: task kworker/0:158:3615 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: da949000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:159:3616 blocked for more than 456 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:159 state:D stack:0 pid:3616 tgid:3616 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e00b9d84 r8:00000002 r7:60000113 r6:e00b9d8c r5:8502d400 r4:8502d400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8502d400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00b9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf11c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8502d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00ad000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85048b8c r4:85048800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85048b8c r4:84bc8b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8502d400 r8:84bc8b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc8b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8b00 r8:8027ed34 r7:e00b5e60 r6:84b83e80 r5:8502d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00b9fb0 to 0xe00b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf1000 INFO: task kworker/0:159:3616 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: dacad000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:160:3618 blocked for more than 456 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:160 state:D stack:0 pid:3618 tgid:3618 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e00c5d84 r8:00000002 r7:60000013 r6:e00c5d8c r5:85020c00 r4:85020c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85020c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00c5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85020c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85048f8c r4:85048c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85048f8c r4:84bc8b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85020c00 r8:84bc8bac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc8b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8b80 r8:8027ed34 r7:e00b5e60 r6:84b83f00 r5:85020c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c5fb0 to 0xe00c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf1180 INFO: task kworker/0:160:3618 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: dbaf4000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:161:3620 blocked for more than 457 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:161 state:D stack:0 pid:3620 tgid:3620 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e00d9d84 r8:00000002 r7:60000113 r6:e00d9d8c r5:85030000 r4:85030000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85030000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00d9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf1400 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85030000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00cd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504938c r4:85049000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504938c r4:84bc8c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85030000 r8:84bc8c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc8c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8c00 r8:8027ed34 r7:e00b5e60 r6:84b83f80 r5:85030000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00d9fb0 to 0xe00d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf1280 INFO: task kworker/0:161:3620 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: dc53f000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:162:3622 blocked for more than 457 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:162 state:D stack:0 pid:3622 tgid:3622 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e00e5d84 r8:00000002 r7:60000113 r6:e00e5d8c r5:85031800 r4:85031800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85031800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00e5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf1580 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85031800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03e8000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504978c r4:85049400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504978c r4:84bc8c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85031800 r8:84bc8cac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc8c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8c80 r8:8027ed34 r7:e00b5e60 r6:85002000 r5:85031800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00e5fb0 to 0xe00e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf1440 INFO: task kworker/0:162:3622 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: dd49c000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:163:3624 blocked for more than 457 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:163 state:D stack:0 pid:3624 tgid:3624 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e03f5d84 r8:00000002 r7:60000113 r6:e03f5d8c r5:85030c00 r4:85030c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85030c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03f5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf1700 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85030c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03ee000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85049b8c r4:85049800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85049b8c r4:84bc8d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85030c00 r8:84bc8d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc8d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8d00 r8:8027ed34 r7:e00b5e60 r6:85002080 r5:85030c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe03f5fb0 to 0xe03f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf1500 INFO: task kworker/0:163:3624 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: dd49c000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:164:3626 blocked for more than 457 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:164 state:D stack:0 pid:3626 tgid:3626 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0409d84 r8:00000002 r7:60000113 r6:e0409d8c r5:85032400 r4:85032400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85032400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0409e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf1800 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85032400 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03ff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85049f8c r4:85049c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85049f8c r4:84bc8d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85032400 r8:84bc8dac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc8d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8d80 r8:8027ed34 r7:e00b5e60 r6:85002100 r5:85032400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0409fb0 to 0xe0409ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf1640 INFO: task kworker/0:164:3626 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: dd49c000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:165:3629 blocked for more than 457 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:165 state:D stack:0 pid:3629 tgid:3629 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0419d84 r8:00000002 r7:60000013 r6:e0419d8c r5:85033000 r4:85033000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85033000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0419e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf1a40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85033000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e041b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504a78c r4:8504a400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504a78c r4:84bc8e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85033000 r8:84bc8e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc8e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8e00 r8:8027ed34 r7:e00b5e60 r6:85002180 r5:85033000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf1780 INFO: task kworker/0:165:3629 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: dd859000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:166:3631 blocked for more than 457 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:166 state:D stack:0 pid:3631 tgid:3631 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e042dd84 r8:00000002 r7:60000113 r6:e042dd8c r5:85035400 r4:85035400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85035400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e042de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be7c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85035400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504b78c r4:8504b400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504b78c r4:84bc8e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85035400 r8:84bc8eac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc8e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8e80 r8:8027ed34 r7:e0419e60 r6:85002200 r5:85035400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe042dfb0 to 0xe042dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf19c0 INFO: task kworker/0:166:3631 is blocked on a mutex likely owned by task kworker/1:85:3548. task:kworker/1:85 state:R running task stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85011800 r8:80200be4 r7:dffcdd54 r6:ffffffff r5:85011800 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffcdd20 to 0xdffcdd68) dd20: df9cc000 dfe9d000 00000001 80239bb8 7f465000 00000001 82abf1c4 82abe5a0 dd40: 7f465000 dfe9d000 8280c9b4 dffcdd9c dffcdda0 dffcdd70 80230af4 80239bd0 dd60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffcddc0 r5:dffcde08 r4:dffcddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0d38c r4:85e0d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0d38c r4:84be0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84be0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d00 r8:8027ed34 r7:dffc9e60 r6:84be0d80 r5:85011800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffcdfb0 to 0xdffcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:167:3632 blocked for more than 457 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:167 state:D stack:0 pid:3632 tgid:3632 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0099d84 r8:00000002 r7:60000113 r6:e0099d8c r5:847c8c00 r4:847c8c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847c8c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0099e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf1bc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0421000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504ab8c r4:8504a800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504ab8c r4:84bc8f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c8c00 r8:84bc8f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bc8f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc8f00 r8:8027ed34 r7:e042de60 r6:84bc8f80 r5:847c8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0099fb0 to 0xe0099ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf19c0 INFO: task kworker/0:167:3632 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 80b39000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:168:3635 blocked for more than 457 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:168 state:D stack:0 pid:3635 tgid:3635 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0431d84 r8:00000002 r7:60000113 r6:e0431d8c r5:847c9800 r4:847c9800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847c9800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0431e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf1d40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504af8c r4:8504ac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504af8c r4:8507f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c9800 r8:8507f02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8507f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507f000 r8:8027ed34 r7:e042de60 r6:8507f080 r5:847c9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf1e80 INFO: task kworker/0:168:3635 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 80d43000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:169:3637 blocked for more than 457 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:169 state:D stack:0 pid:3637 tgid:3637 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e043dd84 r8:00000002 r7:60000013 r6:e043dd8c r5:847ca400 r4:847ca400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847ca400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e043de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf1e00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504b38c r4:8504b000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504b38c r4:8507f100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847ca400 r8:8507f12c r7:82804d40 r6:dddced40 r5:dddced60 r4:8507f100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507f100 r8:8027ed34 r7:e042de60 r6:8507f180 r5:847ca400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be72c0 INFO: task kworker/0:169:3637 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 81cd3000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:170:3639 blocked for more than 457 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:170 state:D stack:0 pid:3639 tgid:3639 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e004dd84 r8:00000002 r7:60000013 r6:e004dd8c r5:847cbc00 r4:847cbc00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847cbc00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e004de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85087180 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847cbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e045b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504bf8c r4:8504bc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504bf8c r4:8507f200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847cbc00 r8:8507f22c r7:82804d40 r6:dddced40 r5:dddced60 r4:8507f200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507f200 r8:8027ed34 r7:e042de60 r6:8507f280 r5:847cbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe004dfb0 to 0xe004dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf1f80 INFO: task kworker/0:170:3639 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8260e000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:171:3641 blocked for more than 457 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:171 state:D stack:0 pid:3641 tgid:3641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0455d84 r8:00000002 r7:60000113 r6:e0455d8c r5:847cd400 r4:847cd400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847cd400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0455e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd7ec0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847cd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e044d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504bb8c r4:8504b800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8504bb8c r4:8507f300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847cd400 r8:8507f32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8507f300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507f300 r8:8027ed34 r7:e004de60 r6:8507f380 r5:847cd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0455fb0 to 0xe0455ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd7f40 INFO: task kworker/0:171:3641 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 83a5a000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:172:3642 blocked for more than 457 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:172 state:D stack:0 pid:3642 tgid:3642 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0459d84 r8:00000002 r7:60000013 r6:e0459d8c r5:847cb000 r4:847cb000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847cb000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0459e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85087300 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847cb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0461000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505038c r4:85050000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505038c r4:8507f400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847cb000 r8:8507f42c r7:82804d40 r6:dddced40 r5:dddced60 r4:8507f400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507f400 r8:8027ed34 r7:e004de60 r6:8507f480 r5:847cb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0459fb0 to 0xe0459ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd7f40 INFO: task kworker/0:172:3642 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8425e000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:173:3645 blocked for more than 457 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:173 state:D stack:0 pid:3645 tgid:3645 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0465d84 r8:00000002 r7:60000013 r6:e0465d8c r5:847cec00 r4:847cec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847cec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0465e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85087680 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e047b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85050b8c r4:85050800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85050b8c r4:8507f500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847cec00 r8:8507f52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8507f500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507f500 r8:8027ed34 r7:e0459e60 r6:8507f580 r5:847cec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85087240 INFO: task kworker/0:173:3645 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8425e000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:174:3647 blocked for more than 457 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:174 state:D stack:0 pid:3647 tgid:3647 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df93dd84 r8:00000002 r7:60000013 r6:df93dd8c r5:847cc800 r4:847cc800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847cc800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df93de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85087400 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e046f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505078c r4:85050400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505078c r4:8507f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847cc800 r8:8507f62c r7:82804d40 r6:dddced40 r5:dddced60 r4:8507f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507f600 r8:8027ed34 r7:e0465e60 r6:8507f680 r5:847cc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf93dfb0 to 0xdf93dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85087380 INFO: task kworker/0:174:3647 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8425e000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:95:3649 blocked for more than 457 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:95 state:D stack:0 pid:3649 tgid:3649 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0445d84 r8:00000002 r7:60000113 r6:e0445d8c r5:85036000 r4:85036000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85036000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0445e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850865c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85036000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0481000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb338c r4:84bb3000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb338c r4:85002280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85036000 r8:850022ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85002280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002280 r8:8027ed34 r7:dfff5e60 r6:85002300 r5:85036000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0445fb0 to 0xe0445ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086280 INFO: task kworker/1:95:3649 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 844e8000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:175:3651 blocked for more than 458 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:175 state:D stack:0 pid:3651 tgid:3651 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0485d84 r8:00000002 r7:60000113 r6:e0485d8c r5:85036c00 r4:85036c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85036c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0485e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85087800 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e048f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85050f8c r4:85050c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85050f8c r4:8507f700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85036c00 r8:8507f72c r7:82804d40 r6:dddced40 r5:dddced60 r4:8507f700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507f700 r8:8027ed34 r7:e0465e60 r6:85002380 r5:85036c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0485fb0 to 0xe0485ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85087640 INFO: task kworker/0:175:3651 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8583f000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:176:3652 blocked for more than 458 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:176 state:D stack:0 pid:3652 tgid:3652 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0489d84 r8:00000002 r7:60000013 r6:e0489d8c r5:85033c00 r4:85033c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85033c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0489e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85087a80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85033c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04a3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505178c r4:85051400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505178c r4:8507f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85033c00 r8:8507f7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8507f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507f780 r8:8027ed34 r7:e0485e60 r6:85002400 r5:85033c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0489fb0 to 0xe0489ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85087640 INFO: task kworker/0:176:3652 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8583f000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:96:3655 blocked for more than 458 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:96 state:D stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e046dd84 r8:00000002 r7:60000013 r6:e046dd8c r5:847c8000 r4:847c8000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847c8000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e046de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85086d00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:847c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9eb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb3b8c r4:84bb3800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb3b8c r4:85002480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c8000 r8:850024ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85002480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002480 r8:8027ed34 r7:dfff5e60 r6:8507f800 r5:847c8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe046dfb0 to 0xe046dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086700 INFO: task kworker/1:96:3655 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8792b000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:177:3657 blocked for more than 458 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:177 state:D stack:0 pid:3657 tgid:3657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0499d84 r8:00000002 r7:60000113 r6:e0499d8c r5:847ce000 r4:847ce000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847ce000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0499e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85087900 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847ce000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0495000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505138c r4:85051000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505138c r4:8507f880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847ce000 r8:8507f8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8507f880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507f880 r8:8027ed34 r7:e0489e60 r6:8507f900 r5:847ce000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0499fb0 to 0xe0499ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85087880 INFO: task kworker/0:177:3657 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8792b000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:178:3659 blocked for more than 458 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:178 state:D stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e04a1d84 r8:00000002 r7:60000013 r6:e04a1d8c r5:83863000 r4:83863000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83863000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04a1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85087e80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83863000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04bb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85051f8c r4:85051c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85051f8c r4:8507fa00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83863000 r8:8507fa2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8507fa00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507fa00 r8:8027ed34 r7:e0489e60 r6:8507fa80 r5:83863000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04a1fb0 to 0xe04a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850879c0 INFO: task kworker/0:178:3659 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 89e27000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:179:3660 blocked for more than 458 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:179 state:D stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e04b5d84 r8:00000002 r7:60000013 r6:e04b5d8c r5:84750000 r4:84750000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84750000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04b5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85087c00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84750000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04a9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85051b8c r4:85051800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85051b8c r4:8507f980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84750000 r8:8507f9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8507f980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507f980 r8:8027ed34 r7:e04a1e60 r6:8507fb00 r5:84750000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04b5fb0 to 0xe04b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850879c0 INFO: task kworker/0:179:3660 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 89fba000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:180:3663 blocked for more than 458 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:180 state:D stack:0 pid:3663 tgid:3663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e04add84 r8:00000002 r7:60000113 r6:e04add8c r5:84750c00 r4:84750c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84750c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04ade08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83899340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84750c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04c1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505238c r4:85052000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505238c r4:8507fb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84750c00 r8:8507fbac r7:82804d40 r6:dddced40 r5:dddced60 r4:8507fb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507fb80 r8:8027ed34 r7:e04a1e60 r6:8507fc00 r5:84750c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04adfb0 to 0xe04adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85087e40 INFO: task kworker/0:180:3663 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8a221000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:181:3665 blocked for more than 458 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:181 state:D stack:0 pid:3665 tgid:3665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e04b9d84 r8:00000002 r7:60000013 r6:e04b9d8c r5:84752400 r4:84752400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84752400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04b9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508f000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84752400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04cb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505278c r4:85052400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505278c r4:8507fc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84752400 r8:8507fcac r7:82804d40 r6:dddced40 r5:dddced60 r4:8507fc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507fc80 r8:8027ed34 r7:e04ade60 r6:8507fd00 r5:84752400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04b9fb0 to 0xe04b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85087f40 INFO: task kworker/0:181:3665 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8a353000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:182:3667 blocked for more than 458 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:182 state:D stack:0 pid:3667 tgid:3667 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e04c5d84 r8:00000002 r7:60000113 r6:e04c5d8c r5:84753000 r4:84753000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84753000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04c5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508f4c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84753000 r7:00000000 r6:83018000 r5:00001000 r4:7f011000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df955000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505338c r4:85053000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505338c r4:8507fd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84753000 r8:8507fdac r7:82804d40 r6:dddced40 r5:dddced60 r4:8507fd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507fd80 r8:8027ed34 r7:e04b9e60 r6:8507fe00 r5:84753000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04c5fb0 to 0xe04c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f180 INFO: task kworker/0:182:3667 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8a783000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:183:3669 blocked for more than 458 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:183 state:D stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e04d5d84 r8:00000002 r7:60000113 r6:e04d5d8c r5:84753c00 r4:84753c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84753c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04d5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508f140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84753c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04d7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85052b8c r4:85052800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85052b8c r4:8507fe80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84753c00 r8:8507feac r7:82804d40 r6:dddced40 r5:dddced60 r4:8507fe80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507fe80 r8:8027ed34 r7:e04c5e60 r6:8507ff00 r5:84753c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d5fb0 to 0xe04d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f100 INFO: task kworker/0:183:3669 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8b3bc000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:184:3671 blocked for more than 458 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:184 state:D stack:0 pid:3671 tgid:3671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e04e1d84 r8:00000002 r7:60000113 r6:e04e1d8c r5:84754800 r4:84754800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84754800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04e1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508f340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84754800 r7:00000000 r6:83018000 r5:00001000 r4:7f0db000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04dd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85052f8c r4:85052c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85052f8c r4:8507ff80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84754800 r8:8507ffac r7:82804d40 r6:dddced40 r5:dddced60 r4:8507ff80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507ff80 r8:8027ed34 r7:e04c5e60 r6:83897400 r5:84754800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e1fb0 to 0xe04e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f2c0 INFO: task kworker/0:184:3671 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8b3bc000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:185:3675 blocked for more than 458 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:185 state:D stack:0 pid:3675 tgid:3675 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e04edd84 r8:00000002 r7:60000013 r6:e04edd8c r5:84756000 r4:84756000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84756000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04ede08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508f5c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84756000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df977000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505378c r4:85053400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505378c r4:83897380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84756000 r8:838973ac r7:82804d40 r6:dddced40 r5:dddced60 r4:83897380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83897380 r8:8027ed34 r7:e04c5e60 r6:85098000 r5:84756000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04edfb0 to 0xe04edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f640 INFO: task kworker/0:185:3675 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8cb3a000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:186:3677 blocked for more than 458 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:186 state:D stack:0 pid:3677 tgid:3677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e050dd84 r8:00000002 r7:60000113 r6:e050dd8c r5:84751800 r4:84751800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84751800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e050de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508bb80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84751800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe89000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506038c r4:85060000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506038c r4:85098080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84751800 r8:850980ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85098080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85098080 r8:8027ed34 r7:e04ede60 r6:85098100 r5:84751800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe050dfb0 to 0xe050dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f800 INFO: task kworker/0:186:3677 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8cb3a000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:187:3678 blocked for more than 458 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:187 state:D stack:0 pid:3678 tgid:3678 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0519d84 r8:00000002 r7:60000113 r6:e0519d8c r5:844e8000 r4:844e8000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844e8000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0519e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508fcc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:844e8000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa5f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85053b8c r4:85053800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85053b8c r4:85098180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844e8000 r8:850981ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85098180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85098180 r8:8027ed34 r7:e050de60 r6:85098200 r5:844e8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0519fb0 to 0xe0519ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508f800 INFO: task kworker/0:187:3678 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8ce62000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:97:3680 blocked for more than 458 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:97 state:D stack:0 pid:3680 tgid:3680 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0521d84 r8:00000002 r7:60000013 r6:e0521d8c r5:844e9800 r4:844e9800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844e9800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0521e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85086a80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa27000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb3f8c r4:84bb3c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb3f8c r4:85002500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844e9800 r8:8500252c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85002500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002500 r8:8027ed34 r7:dfff5e60 r6:85098280 r5:844e9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0521fb0 to 0xe0521ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850869c0 INFO: task kworker/1:97:3680 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8dae5000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:98:3681 blocked for more than 458 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:98 state:D stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0525d84 r8:00000002 r7:60000113 r6:e0525d8c r5:844ea400 r4:844ea400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844ea400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0525e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850861c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844ea400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa95000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84936f8c r4:84936c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84936f8c r4:85002580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844ea400 r8:850025ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85002580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002580 r8:8027ed34 r7:dfff5e60 r6:85098300 r5:844ea400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0525fb0 to 0xe0525ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850869c0 INFO: task kworker/1:98:3681 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 90aa8000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:188:3683 blocked for more than 459 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:188 state:D stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e051dd84 r8:00000002 r7:60000113 r6:e051dd8c r5:844eb000 r4:844eb000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844eb000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e051de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508ba80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:844eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe6d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85053f8c r4:85053c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85053f8c r4:85098380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844eb000 r8:850983ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85098380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85098380 r8:8027ed34 r7:e050de60 r6:85098400 r5:844eb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508fa80 INFO: task kworker/0:188:3683 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 90e76000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:99:3686 blocked for more than 459 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:99 state:D stack:0 pid:3686 tgid:3686 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0531d84 r8:00000002 r7:60000113 r6:e0531d8c r5:844ebc00 r4:844ebc00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844ebc00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0531e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85099240 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd35000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b8f8c r4:850b8c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850b8f8c r4:85002600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844ebc00 r8:8500262c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85002600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002600 r8:8027ed34 r7:dfff5e60 r6:85098480 r5:844ebc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0531fb0 to 0xe0531ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086e40 INFO: task kworker/1:99:3686 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9166b000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:100:3687 blocked for more than 459 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:100 state:D stack:0 pid:3687 tgid:3687 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0535d84 r8:00000002 r7:60000113 r6:e0535d8c r5:844ed400 r4:844ed400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844ed400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0535e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85099000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b878c r4:850b8400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850b878c r4:85002680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844ed400 r8:850026ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85002680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002680 r8:8027ed34 r7:e0531e60 r6:85098500 r5:844ed400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0535fb0 to 0xe0535ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84761040 INFO: task kworker/1:100:3687 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 918bc000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:101:3689 blocked for more than 459 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:101 state:D stack:0 pid:3689 tgid:3689 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e053dd84 r8:00000002 r7:60000113 r6:e053dd8c r5:844ec800 r4:844ec800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844ec800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e053de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85099180 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd25000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b8b8c r4:850b8800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850b8b8c r4:85002700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844ec800 r8:8500272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85002700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002700 r8:8027ed34 r7:e0531e60 r6:85098580 r5:844ec800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe053dfb0 to 0xe053dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85099140 INFO: task kworker/1:101:3689 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 91f06000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:102:3691 blocked for more than 459 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:102 state:D stack:0 pid:3691 tgid:3691 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0549d84 r8:00000002 r7:60000013 r6:e0549d8c r5:844ee000 r4:844ee000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844ee000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0549e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85099bc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bab8c r4:850ba800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850bab8c r4:85002780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844ee000 r8:850027ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85002780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002780 r8:8027ed34 r7:e0531e60 r6:85098600 r5:844ee000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0549fb0 to 0xe0549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850990c0 INFO: task kworker/1:102:3691 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 92320000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:103:3693 blocked for more than 459 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:103 state:D stack:0 pid:3693 tgid:3693 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0575d84 r8:00000002 r7:60000113 r6:e0575d8c r5:844eec00 r4:844eec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844eec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0575e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850993c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd83000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b938c r4:850b9000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850b938c r4:85002880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844eec00 r8:850028ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85002880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002880 r8:8027ed34 r7:e0549e60 r6:85098680 r5:844eec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0575fb0 to 0xe0575ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850994c0 INFO: task kworker/1:103:3693 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9252c000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:104:3695 blocked for more than 459 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:104 state:D stack:0 pid:3695 tgid:3695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e058dd84 r8:00000002 r7:60000113 r6:e058dd8c r5:84755400 r4:84755400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84755400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e058de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85099540 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84755400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd9b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b978c r4:850b9400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850b978c r4:85002800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84755400 r8:8500282c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85002800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002800 r8:8027ed34 r7:e0549e60 r6:85098700 r5:84755400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85099340 INFO: task kworker/1:104:3695 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 92634000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:105:3697 blocked for more than 459 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:105 state:D stack:0 pid:3697 tgid:3697 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e05b9d84 r8:00000002 r7:60000113 r6:e05b9d8c r5:84756c00 r4:84756c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84756c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05b9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85099640 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84756c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfded000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b9b8c r4:850b9800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850b9b8c r4:85002980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84756c00 r8:850029ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85002980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002980 r8:8027ed34 r7:e0549e60 r6:85098780 r5:84756c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05b9fb0 to 0xe05b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85099780 INFO: task kworker/1:105:3697 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 92c0b000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:106:3699 blocked for more than 459 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:106 state:D stack:0 pid:3699 tgid:3699 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e05cdd84 r8:00000002 r7:60000113 r6:e05cdd8c r5:84850c00 r4:84850c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84850c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05cde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850996c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84850c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe01000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b9f8c r4:850b9c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850b9f8c r4:85002900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84850c00 r8:8500292c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85002900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002900 r8:8027ed34 r7:e0549e60 r6:85098800 r5:84850c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05cdfb0 to 0xe05cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85099840 INFO: task kworker/1:106:3699 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 92c0b000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:107:3701 blocked for more than 459 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:107 state:D stack:0 pid:3701 tgid:3701 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e05d5d84 r8:00000002 r7:60000113 r6:e05d5d8c r5:84850000 r4:84850000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84850000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05d5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85099840 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84850000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe11000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ba38c r4:850ba000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ba38c r4:85002a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84850000 r8:85002aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85002a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002a80 r8:8027ed34 r7:e0549e60 r6:85098880 r5:84850000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d5fb0 to 0xe05d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85099700 INFO: task kworker/1:107:3701 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 92c0b000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:108:3703 blocked for more than 459 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:108 state:D stack:0 pid:3703 tgid:3703 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e05ddd84 r8:00000002 r7:60000113 r6:e05ddd8c r5:84853000 r4:84853000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84853000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05dde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850999c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84853000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe21000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ba78c r4:850ba400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ba78c r4:85002a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84853000 r8:85002a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85002a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002a00 r8:8027ed34 r7:e0549e60 r6:85098900 r5:84853000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85099880 INFO: task kworker/1:108:3703 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 92f2a000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:109:3706 blocked for more than 459 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:109 state:D stack:0 pid:3706 tgid:3706 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e04f1d84 r8:00000002 r7:60000113 r6:e04f1d8c r5:85034800 r4:85034800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85034800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507e000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85034800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfead000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bb78c r4:850bb400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850bb78c r4:85002b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85034800 r8:85002b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85002b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002b00 r8:8027ed34 r7:e0549e60 r6:85002b80 r5:85034800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85099980 INFO: task kworker/1:109:3706 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 93260000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:110:3708 blocked for more than 459 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:110 state:D stack:0 pid:3708 tgid:3708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e05e1d84 r8:00000002 r7:60000013 r6:e05e1d8c r5:8502e000 r4:8502e000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8502e000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85099d80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8502e000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe4d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850baf8c r4:850bac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850baf8c r4:85002c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8502e000 r8:85002c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85002c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002c00 r8:8027ed34 r7:e04f1e60 r6:85002c80 r5:8502e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85099d00 INFO: task kworker/1:110:3708 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 93e83000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:111:3711 blocked for more than 459 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:111 state:D stack:0 pid:3711 tgid:3711 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e05edd84 r8:00000002 r7:60000013 r6:e05edd8c r5:85039800 r4:85039800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85039800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05ede08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508f640 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85039800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bb38c r4:850bb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850bb38c r4:85002d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85039800 r8:85002d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85002d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002d00 r8:8027ed34 r7:e04f1e60 r6:85002d80 r5:85039800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05edfb0 to 0xe05edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85099c40 INFO: task kworker/1:111:3711 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 941fa000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:189:3712 blocked for more than 459 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:189 state:D stack:0 pid:3712 tgid:3712 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e05e9d84 r8:00000002 r7:60000113 r6:e05e9d8c r5:85038000 r4:85038000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85038000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508bf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85038000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506078c r4:85060400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506078c r4:85098980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85038000 r8:850989ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85098980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85098980 r8:8027ed34 r7:e050de60 r6:85002e00 r5:85038000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e9fb0 to 0xe05e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508bb00 INFO: task kworker/0:189:3712 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 94696000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:190:3713 blocked for more than 459 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:190 state:D stack:0 pid:3713 tgid:3713 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e04e9d84 r8:00000002 r7:60000113 r6:e04e9d8c r5:84852400 r4:84852400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84852400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04e9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848f6800 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84852400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506138c r4:85061000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506138c r4:85098a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84852400 r8:85098a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85098a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85098a00 r8:8027ed34 r7:e05e9e60 r6:85098a80 r5:84852400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508bb00 INFO: task kworker/0:190:3713 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9476d000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:112:3716 blocked for more than 460 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:112 state:D stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e05f5d84 r8:00000002 r7:60000013 r6:e05f5d8c r5:84854800 r4:84854800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84854800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507e180 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84854800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfec7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bbb8c r4:850bb800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850bbb8c r4:85002e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84854800 r8:85002eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85002e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002e80 r8:8027ed34 r7:e04f1e60 r6:85098b00 r5:84854800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05f5fb0 to 0xe05f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8507e140 INFO: task kworker/1:112:3716 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 94929000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:113:3717 blocked for more than 460 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:113 state:D stack:0 pid:3717 tgid:3717 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e05f9d84 r8:00000002 r7:60000013 r6:e05f9d8c r5:84855400 r4:84855400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84855400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507e700 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84855400 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bc78c r4:850bc400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850bc78c r4:85002f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84855400 r8:85002f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85002f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002f00 r8:8027ed34 r7:e05f5e60 r6:85098b80 r5:84855400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05f9fb0 to 0xe05f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8507e0c0 INFO: task kworker/1:113:3717 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 94da4000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:114:3719 blocked for more than 460 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:114 state:D stack:0 pid:3719 tgid:3719 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e05e5d84 r8:00000002 r7:60000013 r6:e05e5d8c r5:8503b000 r4:8503b000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8503b000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507e480 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8503b000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfef3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bbf8c r4:850bbc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850bbf8c r4:85002f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8503b000 r8:85002fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85002f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002f80 r8:8027ed34 r7:e05f9e60 r6:85006000 r5:8503b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8507e0c0 INFO: task kworker/1:114:3719 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 94ecd000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:115:3721 blocked for more than 460 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:115 state:D stack:0 pid:3721 tgid:3721 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0601d84 r8:00000002 r7:60000113 r6:e0601d8c r5:8503c800 r4:8503c800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8503c800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0601e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507e680 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8503c800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff0b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bc38c r4:850bc000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850bc38c r4:85006080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8503c800 r8:850060ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85006080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85006080 r8:8027ed34 r7:e05f9e60 r6:85006100 r5:8503c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0601fb0 to 0xe0601ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8507e440 INFO: task kworker/1:115:3721 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9624c000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:116:3725 blocked for more than 460 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:116 state:D stack:0 pid:3725 tgid:3725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e05fdd84 r8:00000002 r7:60000013 r6:e05fdd8c r5:8503bc00 r4:8503bc00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8503bc00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05fde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507e8c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8503bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfffb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bcb8c r4:850bc800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850bcb8c r4:85006180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8503bc00 r8:850061ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85006180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85006180 r8:8027ed34 r7:e05f9e60 r6:85006200 r5:8503bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05fdfb0 to 0xe05fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8507e740 INFO: task kworker/1:116:3725 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9656f000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:117:3727 blocked for more than 460 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:117 state:D stack:0 pid:3727 tgid:3727 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e060dd84 r8:00000002 r7:60000113 r6:e060dd8c r5:84856c00 r4:84856c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84856c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e060de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507e980 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84856c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0513000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bcf8c r4:850bcc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850bcf8c r4:85006280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84856c00 r8:850062ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85006280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85006280 r8:8027ed34 r7:e05fde60 r6:85098c00 r5:84856c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8507e7c0 INFO: task kworker/1:117:3727 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 968aa000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:118:3729 blocked for more than 460 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:118 state:D stack:0 pid:3729 tgid:3729 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0615d84 r8:00000002 r7:60000113 r6:e0615d8c r5:84856000 r4:84856000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84856000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0615e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfd000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84856000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05a7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850be38c r4:850be000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850be38c r4:85006300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84856000 r8:8500632c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85006300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85006300 r8:8027ed34 r7:e060de60 r6:85098c80 r5:84856000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0615fb0 to 0xe0615ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8507e9c0 INFO: task kworker/1:118:3729 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 96bfc000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:119:3730 blocked for more than 460 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:119 state:D stack:0 pid:3730 tgid:3730 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0619d84 r8:00000002 r7:60000113 r6:e0619d8c r5:84851800 r4:84851800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84851800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0619e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507ed00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84851800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e055b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bd38c r4:850bd000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850bd38c r4:85006380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84851800 r8:850063ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85006380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85006380 r8:8027ed34 r7:e0615e60 r6:85098d00 r5:84851800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0619fb0 to 0xe0619ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8507e9c0 INFO: task kworker/1:119:3730 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9783a000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:120:3732 blocked for more than 460 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:120 state:D stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0621d84 r8:00000002 r7:60000013 r6:e0621d8c r5:84853c00 r4:84853c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84853c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0621e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507ec80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84853c00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0565000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bd78c r4:850bd400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850bd78c r4:85006400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84853c00 r8:8500642c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85006400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85006400 r8:8027ed34 r7:e0615e60 r6:85098d80 r5:84853c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0621fb0 to 0xe0621ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8507eb80 INFO: task kworker/1:120:3732 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 98176000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:191:3734 blocked for more than 460 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:191 state:D stack:0 pid:3734 tgid:3734 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0629d84 r8:00000002 r7:60000113 r6:e0629d8c r5:849e0c00 r4:849e0c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849e0c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0629e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfbb80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbc1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85060f8c r4:85060c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85060f8c r4:85098e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0c00 r8:85098e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85098e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85098e00 r8:8027ed34 r7:e04e9e60 r6:85098e80 r5:849e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0629fb0 to 0xe0629ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508b540 INFO: task kworker/0:191:3734 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 98422000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:121:3735 blocked for more than 460 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:121 state:D stack:0 pid:3735 tgid:3735 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e062dd84 r8:00000002 r7:60000113 r6:e062dd8c r5:849e1800 r4:849e1800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849e1800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e062de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507edc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e057b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bdb8c r4:850bd800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850bdb8c r4:85006480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e1800 r8:850064ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85006480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85006480 r8:8027ed34 r7:e0615e60 r6:85098f00 r5:849e1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe062dfb0 to 0xe062dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8507ecc0 INFO: task kworker/1:121:3735 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 989bb000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:122:3737 blocked for more than 460 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:122 state:D stack:0 pid:3737 tgid:3737 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0639d84 r8:00000002 r7:60000013 r6:e0639d8c r5:849e3000 r4:849e3000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849e3000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0639e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85099e40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0591000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bdf8c r4:850bdc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850bdf8c r4:85006500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e3000 r8:8500652c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85006500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85006500 r8:8027ed34 r7:e0615e60 r6:85098f80 r5:849e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8507eb80 INFO: task kworker/1:122:3737 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 989bb000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:123:3739 blocked for more than 460 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:123 state:D stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0641d84 r8:00000002 r7:60000113 r6:e0641d8c r5:849e2400 r4:849e2400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849e2400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0641e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfd4c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0667000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bf38c r4:850bf000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850bf38c r4:85006580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e2400 r8:850065ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85006580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85006580 r8:8027ed34 r7:e0615e60 r6:84bef000 r5:849e2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0641fb0 to 0xe0641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8507ef00 INFO: task kworker/1:123:3739 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 98ebe000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:124:3741 blocked for more than 460 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:124 state:D stack:0 pid:3741 tgid:3741 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0649d84 r8:00000002 r7:60000113 r6:e0649d8c r5:849e4800 r4:849e4800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849e4800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0649e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfd1c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05b1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850be78c r4:850be400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850be78c r4:85006600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e4800 r8:8500662c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85006600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85006600 r8:8027ed34 r7:e0641e60 r6:84bef080 r5:849e4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0649fb0 to 0xe0649ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfd100 INFO: task kworker/1:124:3741 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 99670000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:125:3743 blocked for more than 460 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:125 state:D stack:0 pid:3743 tgid:3743 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0651d84 r8:00000002 r7:60000113 r6:e0651d8c r5:849e5400 r4:849e5400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849e5400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0651e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfd2c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0653000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850beb8c r4:850be800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850beb8c r4:85006680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e5400 r8:850066ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85006680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85006680 r8:8027ed34 r7:e0641e60 r6:84bef100 r5:849e5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0651fb0 to 0xe0651ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfd180 INFO: task kworker/1:125:3743 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 99861000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:126:3745 blocked for more than 460 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:126 state:D stack:0 pid:3745 tgid:3745 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0661d84 r8:00000002 r7:60000013 r6:e0661d8c r5:849e6000 r4:849e6000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849e6000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0661e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfd380 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0659000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bef8c r4:850bec00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850bef8c r4:85006700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e6000 r8:8500672c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85006700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85006700 r8:8027ed34 r7:e0641e60 r6:84bef180 r5:849e6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0661fb0 to 0xe0661ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfd240 INFO: task kworker/1:126:3745 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 99c9a000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:127:3748 blocked for more than 460 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:127 state:D stack:0 pid:3748 tgid:3748 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e067dd84 r8:00000002 r7:60000013 r6:e067dd8c r5:849e3c00 r4:849e3c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849e3c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e067de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfd6c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0675000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bf78c r4:850bf400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850bf78c r4:85006780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e3c00 r8:850067ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85006780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85006780 r8:8027ed34 r7:e0641e60 r6:84bef200 r5:849e3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe067dfb0 to 0xe067dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfd3c0 INFO: task kworker/1:127:3748 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 99eab000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:128:3750 blocked for more than 460 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:128 state:D stack:0 pid:3750 tgid:3750 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0689d84 r8:00000002 r7:60000113 r6:e0689d8c r5:844e8c00 r4:844e8c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844e8c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0689e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508b780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc37000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c138c r4:850c1000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c138c r4:85006800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844e8c00 r8:8500682c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85006800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85006800 r8:8027ed34 r7:e067de60 r6:84bef280 r5:844e8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0689fb0 to 0xe0689ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfd600 INFO: task kworker/1:128:3750 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9a4ca000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:129:3751 blocked for more than 460 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:129 state:D stack:0 pid:3751 tgid:3751 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e068dd84 r8:00000002 r7:60000113 r6:e068dd8c r5:849e6c00 r4:849e6c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849e6c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e068de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfd780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e068f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bfb8c r4:850bf800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850bfb8c r4:85006880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e6c00 r8:850068ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85006880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85006880 r8:8027ed34 r7:e0689e60 r6:84bef300 r5:849e6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe068dfb0 to 0xe068dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfd600 INFO: task kworker/1:129:3751 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9a856000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:130:3753 blocked for more than 460 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:130 state:D stack:0 pid:3753 tgid:3753 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06a1d84 r8:00000002 r7:60000113 r6:e06a1d8c r5:847c0c00 r4:847c0c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847c0c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfd8c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:847c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0695000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bff8c r4:850bfc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850bff8c r4:85006900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c0c00 r8:8500692c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85006900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85006900 r8:8027ed34 r7:e0689e60 r6:84bef380 r5:847c0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a1fb0 to 0xe06a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfd7c0 INFO: task kworker/1:130:3753 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9ad56000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:131:3755 blocked for more than 461 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:131 state:D stack:0 pid:3755 tgid:3755 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e000dd84 r8:00000002 r7:60000013 r6:e000dd8c r5:847c2400 r4:847c2400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847c2400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e000de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfd9c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:847c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfac5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c038c r4:850c0000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c038c r4:85006980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c2400 r8:850069ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85006980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85006980 r8:8027ed34 r7:e0689e60 r6:84bef400 r5:847c2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe000dfb0 to 0xe000dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfd900 INFO: task kworker/1:131:3755 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9bcb8000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:132:3757 blocked for more than 461 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:132 state:D stack:0 pid:3757 tgid:3757 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0021d84 r8:00000002 r7:60000113 r6:e0021d8c r5:847c1800 r4:847c1800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847c1800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0021e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfdb00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:847c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c078c r4:850c0400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c078c r4:85006a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c1800 r8:85006a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85006a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85006a00 r8:8027ed34 r7:e0689e60 r6:84bef480 r5:847c1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0021fb0 to 0xe0021ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfda00 INFO: task kworker/1:132:3757 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9be9b000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:133:3759 blocked for more than 461 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:133 state:D stack:0 pid:3759 tgid:3759 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0061d84 r8:00000002 r7:60000113 r6:e0061d8c r5:847c3000 r4:847c3000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847c3000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0061e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfdb40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:847c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb37000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c0b8c r4:850c0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c0b8c r4:85006a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c3000 r8:85006aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85006a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85006a80 r8:8027ed34 r7:e0689e60 r6:84bef500 r5:847c3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0061fb0 to 0xe0061ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfde00 INFO: task kworker/1:133:3759 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9bea5000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:134:3761 blocked for more than 461 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:134 state:D stack:0 pid:3761 tgid:3761 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0085d84 r8:00000002 r7:60000013 r6:e0085d8c r5:847c5400 r4:847c5400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847c5400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0085e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfdd40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:847c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb65000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c0f8c r4:850c0c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c0f8c r4:85006b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c5400 r8:85006b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85006b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85006b00 r8:8027ed34 r7:e0689e60 r6:84bef580 r5:847c5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0085fb0 to 0xe0085ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfdc80 INFO: task kworker/1:134:3761 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9c1ed000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:135:3763 blocked for more than 461 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:135 state:D stack:0 pid:3763 tgid:3763 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e00b1d84 r8:00000002 r7:60000013 r6:e00b1d8c r5:847c3c00 r4:847c3c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847c3c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00b1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bda140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:847c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfca9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c1b8c r4:850c1800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c1b8c r4:85006b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c3c00 r8:85006bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85006b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85006b80 r8:8027ed34 r7:e0689e60 r6:84bef600 r5:847c3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00b1fb0 to 0xe00b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfdd80 INFO: task kworker/1:135:3763 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9c997000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:192:3767 blocked for more than 461 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:192 state:D stack:0 pid:3767 tgid:3767 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0605d84 r8:00000002 r7:60000113 r6:e0605d8c r5:847c6000 r4:847c6000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847c6000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0605e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcfd80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847c6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0415000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85061b8c r4:85061800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85061b8c r4:84bef680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c6000 r8:84bef6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bef680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bef680 r8:8027ed34 r7:e04e9e60 r6:84bef700 r5:847c6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0605fb0 to 0xe0605ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfba40 INFO: task kworker/0:192:3767 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9cbe3000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:193:3768 blocked for more than 461 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:193 state:D stack:0 pid:3768 tgid:3768 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0081d84 r8:00000002 r7:60000113 r6:e0081d8c r5:847c6c00 r4:847c6c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847c6c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0081e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcf8c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00cb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506178c r4:85061400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506178c r4:84bef780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c6c00 r8:84bef7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bef780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bef780 r8:8027ed34 r7:e0605e60 r6:84bef800 r5:847c6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0081fb0 to 0xe0081ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bfba40 INFO: task kworker/0:193:3768 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9cbe3000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:136:3770 blocked for more than 461 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:136 state:D stack:0 pid:3770 tgid:3770 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e00bdd84 r8:00000002 r7:60000113 r6:e00bdd8c r5:8503d400 r4:8503d400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8503d400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00bde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bda040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8503d400 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc71000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c178c r4:850c1400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c178c r4:85006c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8503d400 r8:85006c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85006c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85006c00 r8:8027ed34 r7:e00b1e60 r6:85006c80 r5:8503d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00bdfb0 to 0xe00bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508b6c0 INFO: task kworker/1:136:3770 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9cf56000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:137:3773 blocked for more than 461 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:137 state:D stack:0 pid:3773 tgid:3773 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e00ddd84 r8:00000002 r7:60000113 r6:e00ddd8c r5:8503ec00 r4:8503ec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8503ec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00dde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bda2c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8503ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff47000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c1f8c r4:850c1c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c1f8c r4:85006d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8503ec00 r8:85006d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85006d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85006d00 r8:8027ed34 r7:e00b1e60 r6:85006d80 r5:8503ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00ddfb0 to 0xe00ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bda280 INFO: task kworker/1:137:3773 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9d571000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:138:3775 blocked for more than 461 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:138 state:D stack:0 pid:3775 tgid:3775 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e03fdd84 r8:00000002 r7:60000113 r6:e03fdd8c r5:8503e000 r4:8503e000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8503e000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03fde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bda380 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8503e000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff5b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c238c r4:850c2000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c238c r4:85006e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8503e000 r8:85006e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85006e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85006e00 r8:8027ed34 r7:e00dde60 r6:85006e80 r5:8503e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe03fdfb0 to 0xe03fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bda200 INFO: task kworker/1:138:3775 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9d680000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:139:3777 blocked for more than 461 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:139 state:D stack:0 pid:3777 tgid:3777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e040dd84 r8:00000002 r7:60000113 r6:e040dd8c r5:85038c00 r4:85038c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85038c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e040de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bda5c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85038c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff6d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c278c r4:850c2400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c278c r4:85006f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85038c00 r8:85006f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85006f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85006f00 r8:8027ed34 r7:e03fde60 r6:85006f80 r5:85038c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe040dfb0 to 0xe040dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bda200 INFO: task kworker/1:139:3777 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9d8bf000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:140:3779 blocked for more than 461 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:140 state:D stack:0 pid:3779 tgid:3779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0411d84 r8:00000002 r7:60000013 r6:e0411d8c r5:8503a400 r4:8503a400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8503a400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0411e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bda680 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8503a400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff7d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c2b8c r4:850c2800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c2b8c r4:84b86000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8503a400 r8:84b8602c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b86000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86000 r8:8027ed34 r7:e040de60 r6:84b86080 r5:8503a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0411fb0 to 0xe0411ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bda580 INFO: task kworker/1:140:3779 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9dd10000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:141:3781 blocked for more than 461 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:141 state:D stack:0 pid:3781 tgid:3781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0425d84 r8:00000002 r7:60000013 r6:e0425d8c r5:85026c00 r4:85026c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85026c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0425e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bda880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85026c00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0027000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c2f8c r4:850c2c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c2f8c r4:84b86100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85026c00 r8:84b8612c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b86100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86100 r8:8027ed34 r7:e0411e60 r6:84b86180 r5:85026c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bda6c0 INFO: task kworker/1:141:3781 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9e423000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:142:3784 blocked for more than 461 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:142 state:D stack:0 pid:3784 tgid:3784 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06add84 r8:00000002 r7:60000113 r6:e06add8c r5:850f8000 r4:850f8000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850f8000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06ade08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdad00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:850f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0071000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c3b8c r4:850c3800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c3b8c r4:84b86200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850f8000 r8:84b8622c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b86200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86200 r8:8027ed34 r7:e0425e60 r6:84b86280 r5:850f8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06adfb0 to 0xe06adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bdac40 INFO: task kworker/1:142:3784 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9e7b9000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:143:3785 blocked for more than 461 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:143 state:D stack:0 pid:3785 tgid:3785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e03f9d84 r8:00000002 r7:60000013 r6:e03f9d8c r5:850f8c00 r4:850f8c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850f8c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e03f9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdaa00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:850f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c338c r4:850c3000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c338c r4:84b86300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850f8c00 r8:84b8632c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b86300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86300 r8:8027ed34 r7:e06ade60 r6:84b86380 r5:850f8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe03f9fb0 to 0xe03f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bdac40 INFO: task kworker/1:143:3785 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9f571000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:144:3787 blocked for more than 461 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:144 state:D stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06b1d84 r8:00000002 r7:60000013 r6:e06b1d8c r5:850f9800 r4:850f9800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850f9800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdab00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:850f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0063000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c378c r4:850c3400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c378c r4:84b86400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850f9800 r8:84b8642c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b86400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86400 r8:8027ed34 r7:e06ade60 r6:84b86480 r5:850f9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b1fb0 to 0xe06b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bdaa80 INFO: task kworker/1:144:3787 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9f863000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:145:3790 blocked for more than 461 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:145 state:D stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06b9d84 r8:00000002 r7:60000013 r6:e06b9d8c r5:850fa400 r4:850fa400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850fa400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdae80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:850fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0091000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c3f8c r4:850c3c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c3f8c r4:84b86500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850fa400 r8:84b8652c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b86500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86500 r8:8027ed34 r7:e06ade60 r6:84b86580 r5:850fa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bdacc0 INFO: task kworker/1:145:3790 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9f909000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:146:3791 blocked for more than 462 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:146 state:D stack:0 pid:3791 tgid:3791 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06b5d84 r8:00000002 r7:60000013 r6:e06b5d8c r5:850fb000 r4:850fb000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850fb000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b70040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:850fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00bf000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cc78c r4:850cc400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cc78c r4:84b86600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850fb000 r8:84b8662c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b86600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86600 r8:8027ed34 r7:e06b9e60 r6:84b86680 r5:850fb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b5fb0 to 0xe06b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bdadc0 INFO: task kworker/1:146:3791 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a044a000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:147:3793 blocked for more than 462 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:147 state:D stack:0 pid:3793 tgid:3793 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06bdd84 r8:00000002 r7:60000013 r6:e06bdd8c r5:850fc800 r4:850fc800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850fc800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06bde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507e3c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:850fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00a1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cc38c r4:850cc000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cc38c r4:84b86700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850fc800 r8:84b8672c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b86700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86700 r8:8027ed34 r7:e06b5e60 r6:84b86780 r5:850fc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06bdfb0 to 0xe06bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b70180 INFO: task kworker/1:147:3793 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a0608000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:148:3794 blocked for more than 462 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:148 state:D stack:0 pid:3794 tgid:3794 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06cdd84 r8:00000002 r7:60000113 r6:e06cdd8c r5:850fe000 r4:850fe000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850fe000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06cde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b70600 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:850fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03ec000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ccf8c r4:850ccc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ccf8c r4:84b86800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850fe000 r8:84b8682c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b86800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86800 r8:8027ed34 r7:e06b5e60 r6:84b86880 r5:850fe000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b70000 INFO: task kworker/1:148:3794 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a0a23000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:149:3796 blocked for more than 462 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:149 state:D stack:0 pid:3796 tgid:3796 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06d1d84 r8:00000002 r7:60000113 r6:e06d1d8c r5:850fbc00 r4:850fbc00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850fbc00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b70580 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:850fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ccb8c r4:850cc800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ccb8c r4:84b86900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850fbc00 r8:84b8692c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b86900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86900 r8:8027ed34 r7:e06cde60 r6:84b86980 r5:850fbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06d1fb0 to 0xe06d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b70000 INFO: task kworker/1:149:3796 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a0d48000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:194:3799 blocked for more than 462 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:194 state:D stack:0 pid:3799 tgid:3799 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06d9d84 r8:00000002 r7:60000113 r6:e06d9d8c r5:847c0000 r4:847c0000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847c0000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6da80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9d9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85062f8c r4:85062c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85062f8c r4:84bef880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c0000 r8:84bef8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bef880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bef880 r8:8027ed34 r7:e0605e60 r6:84bef900 r5:847c0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06d9fb0 to 0xe06d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bcf940 INFO: task kworker/0:194:3799 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a1ac6000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:150:3801 blocked for more than 462 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:150 state:D stack:0 pid:3801 tgid:3801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06e1d84 r8:00000002 r7:60000013 r6:e06e1d8c r5:849e0000 r4:849e0000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849e0000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b70700 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0401000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cd38c r4:850cd000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cd38c r4:84b86a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e0000 r8:84b86a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b86a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86a00 r8:8027ed34 r7:e06cde60 r6:84bef980 r5:849e0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e1fb0 to 0xe06e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b706c0 INFO: task kworker/1:150:3801 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a1dd8000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:151:3802 blocked for more than 462 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:151 state:D stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06e5d84 r8:00000002 r7:60000013 r6:e06e5d8c r5:83c48000 r4:83c48000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83c48000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b70a40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83c48000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0437000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cdb8c r4:850cd800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cdb8c r4:84b86a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83c48000 r8:84b86aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b86a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86a80 r8:8027ed34 r7:e06e1e60 r6:84befa00 r5:83c48000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e5fb0 to 0xe06e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b70740 INFO: task kworker/1:151:3802 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a2d9c000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:195:3805 blocked for more than 462 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:195 state:D stack:0 pid:3805 tgid:3805 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06d5d84 r8:00000002 r7:60000113 r6:e06d5d8c r5:83c48c00 r4:83c48c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83c48c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcfa00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83c48c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0449000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85061f8c r4:85061c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85061f8c r4:84befa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83c48c00 r8:84befaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84befa80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84befa80 r8:8027ed34 r7:e06d9e60 r6:84befb00 r5:83c48c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06d5fb0 to 0xe06d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bcfd40 INFO: task kworker/0:195:3805 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a2d9d000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:152:3807 blocked for more than 462 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:152 state:D stack:0 pid:3807 tgid:3807 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06e9d84 r8:00000002 r7:60000113 r6:e06e9d8c r5:83c49800 r4:83c49800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83c49800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b70980 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83c49800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0427000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cd78c r4:850cd400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cd78c r4:84b86b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83c49800 r8:84b86b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b86b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86b00 r8:8027ed34 r7:e06e5e60 r6:84befb80 r5:83c49800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e9fb0 to 0xe06e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b70940 INFO: task kworker/1:152:3807 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a428c000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:153:3808 blocked for more than 462 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:153 state:D stack:0 pid:3808 tgid:3808 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06edd84 r8:00000002 r7:60000113 r6:e06edd8c r5:83c4a400 r4:83c4a400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83c4a400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06ede08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84886980 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83c4a400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfef5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cf78c r4:850cf400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cf78c r4:84b86b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83c4a400 r8:84b86bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b86b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86b80 r8:8027ed34 r7:e06e5e60 r6:84befc00 r5:83c4a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06edfb0 to 0xe06edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b70a80 INFO: task kworker/1:153:3808 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a4424000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:154:3811 blocked for more than 462 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:154 state:D stack:0 pid:3811 tgid:3811 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06ddd84 r8:00000002 r7:60000113 r6:e06ddd8c r5:83c4b000 r4:83c4b000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83c4b000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06dde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6d000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83c4b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0473000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506278c r4:85062400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8506278c r4:84b86c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83c4b000 r8:84b86c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b86c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86c00 r8:8027ed34 r7:e06ede60 r6:84befd00 r5:83c4b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06ddfb0 to 0xe06ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b70c00 INFO: task kworker/1:154:3811 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a4c68000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:196:3812 blocked for more than 462 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:196 state:D stack:0 pid:3812 tgid:3812 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06f1d84 r8:00000002 r7:60000113 r6:e06f1d8c r5:83c4bc00 r4:83c4bc00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83c4bc00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcf440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83c4bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0451000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506238c r4:85062000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506238c r4:84befc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83c4bc00 r8:84befcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84befc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84befc80 r8:8027ed34 r7:e06d9e60 r6:84befd80 r5:83c4bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06f1fb0 to 0xe06f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bcfb40 INFO: task kworker/0:196:3812 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a5001000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:197:3814 blocked for more than 462 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:197 state:D stack:0 pid:3814 tgid:3814 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06c9d84 r8:00000002 r7:60000113 r6:e06c9d8c r5:83c4c800 r4:83c4c800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83c4c800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b70d80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83c4c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0467000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cdf8c r4:850cdc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850cdf8c r4:84befe00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83c4c800 r8:84befe2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84befe00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84befe00 r8:8027ed34 r7:e06d9e60 r6:84befe80 r5:83c4c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bcf540 INFO: task kworker/0:197:3814 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a523f000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:198:3816 blocked for more than 462 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:198 state:D stack:0 pid:3816 tgid:3816 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06f5d84 r8:00000002 r7:60000113 r6:e06f5d8c r5:83c4d400 r4:83c4d400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83c4d400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b732c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83c4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ad000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cf38c r4:850cf000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850cf38c r4:84beff00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83c4d400 r8:84beff2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84beff00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84beff00 r8:8027ed34 r7:e06d9e60 r6:84beff80 r5:83c4d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06f5fb0 to 0xe06f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b6d100 INFO: task kworker/0:198:3816 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a5519000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:155:3819 blocked for more than 462 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:155 state:D stack:0 pid:3819 tgid:3819 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0709d84 r8:00000002 r7:60000113 r6:e0709d8c r5:83c4e000 r4:83c4e000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83c4e000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0709e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b70fc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83c4e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e047d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ce38c r4:850ce000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ce38c r4:84b86c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83c4e000 r8:84b86cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b86c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86c80 r8:8027ed34 r7:e06ede60 r6:84b67000 r5:83c4e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0709fb0 to 0xe0709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b70f80 INFO: task kworker/1:155:3819 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a5c37000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:156:3821 blocked for more than 462 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:156 state:D stack:0 pid:3821 tgid:3821 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0711d84 r8:00000002 r7:60000013 r6:e0711d8c r5:84988c00 r4:84988c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84988c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0711e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b70d40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84988c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e048d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ce78c r4:850ce400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ce78c r4:84b86d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84988c00 r8:84b86d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b86d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86d00 r8:8027ed34 r7:e06ede60 r6:84b67080 r5:84988c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0711fb0 to 0xe0711ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b70cc0 INFO: task kworker/1:156:3821 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a5de6000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:157:3822 blocked for more than 462 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:157 state:D stack:0 pid:3822 tgid:3822 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0719d84 r8:00000002 r7:60000013 r6:e0719d8c r5:84989800 r4:84989800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84989800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0719e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73080 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84989800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e049b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ceb8c r4:850ce800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ceb8c r4:84b86d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84989800 r8:84b86dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b86d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86d80 r8:8027ed34 r7:e06ede60 r6:84b67100 r5:84989800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0719fb0 to 0xe0719ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bdaf40 INFO: task kworker/1:157:3822 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a63f5000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:158:3824 blocked for more than 462 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:158 state:D stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0721d84 r8:00000002 r7:60000113 r6:e0721d8c r5:84988000 r4:84988000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84988000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0721e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdfd00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84988000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb8b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cef8c r4:850cec00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cef8c r4:84b86e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84988000 r8:84b86e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b86e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86e00 r8:8027ed34 r7:e06ede60 r6:84b67180 r5:84988000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b730c0 INFO: task kworker/1:158:3824 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a63f5000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:199:3828 blocked for more than 462 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:199 state:D stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0529d84 r8:00000002 r7:60000013 r6:e0529d8c r5:8498a400 r4:8498a400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8498a400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0529e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6dcc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8498a400 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa8b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506378c r4:85063400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506378c r4:84b67200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8498a400 r8:84b6722c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b67200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b67200 r8:8027ed34 r7:e06d9e60 r6:84b67280 r5:8498a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b6d800 INFO: task kworker/0:199:3828 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a663e000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:200:3830 blocked for more than 462 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:200 state:D stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0725d84 r8:00000002 r7:60000113 r6:e0725d8c r5:8498bc00 r4:8498bc00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8498bc00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0725e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8498bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa3f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506338c r4:85063000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506338c r4:84b67300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8498bc00 r8:84b6732c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b67300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b67300 r8:8027ed34 r7:e0529e60 r6:84b67380 r5:8498bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0725fb0 to 0xe0725ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b6d640 INFO: task kworker/0:200:3830 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a7265000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:159:3831 blocked for more than 463 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:159 state:D stack:0 pid:3831 tgid:3831 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06fdd84 r8:00000002 r7:60000113 r6:e06fdd8c r5:850fd400 r4:850fd400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850fd400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06fde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b713c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:850fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe4b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85078f8c r4:85078c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85078f8c r4:84b86e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850fd400 r8:84b86eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b86e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86e80 r8:8027ed34 r7:e06ede60 r6:84b86f00 r5:850fd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06fdfb0 to 0xe06fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73440 INFO: task kworker/1:159:3831 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:dffd5dc0 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:201:3834 blocked for more than 463 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:201 state:D stack:0 pid:3834 tgid:3834 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e05d1d84 r8:00000002 r7:60000113 r6:e05d1d8c r5:847c4800 r4:847c4800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05d1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6dd80 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85063b8c r4:85063800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85063b8c r4:84b67400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c4800 r8:84b6742c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b67400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b67400 r8:8027ed34 r7:e0529e60 r6:84b86f80 r5:847c4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d1fb0 to 0xe05d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b6dc40 INFO: task kworker/0:201:3834 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a7dfb000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e063de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6d600 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85100c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd45000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848b578c r4:848b5400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848b578c r4:84b67480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85100c00 r8:84b674ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b67480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b67480 r8:8027ed34 r7:e05d1e60 r6:84b7a000 r5:85100c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe063dfb0 to 0xe063dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b6ddc0 INFO: task kworker/0:202:3836 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) r5:80070113 r4:80239bd0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:203 state:D stack:0 pid:3837 tgid:3837 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0679e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6ddc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85101800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd19000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85063f8c r4:85063c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85063f8c r4:84b67500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85101800 r8:84b6752c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b67500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b67500 r8:8027ed34 r7:e063de60 r6:84b7a080 r5:85101800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b6dfc0 INFO: task kworker/0:203:3837 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a8d01000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc2-syzkaller #0 Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0729d84 r8:00000002 r7:60000113 r6:e0729d8c r5:85100000 r4:85100000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85100000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0729e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6d3c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85100000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd91000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848b538c r4:848b5000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:848b538c r4:84b67580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85100000 r8:84b675ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b67580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b67580 r8:8027ed34 r7:e063de60 r6:84b7a100 r5:85100000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0729fb0 to 0xe0729ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b6d980 INFO: task kworker/0:204:3839 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:82abf1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:205:3841 blocked for more than 463 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:205 state:D stack:0 pid:3841 tgid:3841 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0751d84 r8:00000002 r7:60000113 r6:e0751d8c r5:85102400 r4:85102400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85102400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0751e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b71040 r5:00001000 r4:dfdf3000 r5:8507838c r4:85078000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8507838c r4:84b67600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85102400 r8:84b6762c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b67600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b67600 r8:8027ed34 r7:e0729e60 r6:84b7a180 r5:85102400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0751fb0 to 0xe0751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b6d980 INFO: task kworker/0:205:3841 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: a9576000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:206:3843 blocked for more than 463 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:206 state:D stack:0 pid:3843 tgid:3843 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0759d84 r8:00000002 r7:60000013 r6:e0759d8c r5:85103000 r4:85103000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85103000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0759e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b711c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85103000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe09000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8507878c r4:85078400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8507878c r4:84b67680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85103000 r8:84b676ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b67680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b67680 r8:8027ed34 r7:e0751e60 r6:84b7a200 r5:85103000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0759fb0 to 0xe0759ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b6d440 INFO: task kworker/0:206:3843 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) Exception stack(0xdffd5d20 to 0xdffd5d68) [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:207:3845 blocked for more than 463 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:207 state:D stack:0 pid:3845 tgid:3845 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0761d84 r8:00000002 r7:60000113 r6:e0761d8c r5:85104800 r4:85104800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85104800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0761e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b71900 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85104800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04e5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8507b38c r4:8507b000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8507b38c r4:84b67700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85104800 r8:84b6772c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b67700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b67700 r8:8027ed34 r7:e0759e60 r6:84b7a280 r5:85104800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0761fb0 to 0xe0761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b71240 INFO: task kworker/0:207:3845 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: aa0c6000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:208 state:D stack:0 pid:3847 tgid:3847 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85106000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85106000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0769e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b71280 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85106000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe2f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e077de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b71580 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85103c00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe6f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8507938c r4:85079000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8507938c r4:84b67800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85103c00 r8:84b6782c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b67800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b67800 r8:8027ed34 r7:e0761e60 r6:84b7a380 r5:85103c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe077dfb0 to 0xe077dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b71300 INFO: task kworker/0:209:3849 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 Exception stack(0xdffd5d20 to 0xdffd5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:160:3852 blocked for more than 463 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:160 state:D stack:0 pid:3852 tgid:3852 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e4789d84 r8:00000002 r7:60000113 r6:e4789d8c r5:850fec00 r4:850fec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850fec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4789e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b70b40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:850fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfed1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85079f8c r4:85079c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85079f8c r4:84b7a400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850fec00 r8:84b7a42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7a400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7a400 r8:8027ed34 r7:e06ede60 r6:84b7a480 r5:850fec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4789fb0 to 0xe4789ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73480 INFO: task kworker/1:160:3852 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:210:3853 blocked for more than 463 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:210 state:D stack:0 pid:3853 tgid:3853 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e478dd84 r8:00000002 r7:60000113 r6:e478dd8c r5:85105400 r4:85105400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85105400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e478de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b71640 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85105400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe91000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8507978c r4:85079400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8507978c r4:84b67880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85105400 r8:84b678ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b67880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b67880 r8:8027ed34 r7:e0761e60 r6:84b7a500 r5:85105400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe478dfb0 to 0xe478dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b71500 INFO: task kworker/0:210:3853 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: aae0b000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:211:3855 blocked for more than 463 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:211 state:D stack:0 pid:3855 tgid:3855 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e4795d84 r8:00000002 r7:60000113 r6:e4795d8c r5:85108c00 r4:85108c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85108c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4795e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b71840 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85108c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85079b8c r4:85079800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85079b8c r4:84b67900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85108c00 r8:84b6792c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b67900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b67900 r8:8027ed34 r7:e0761e60 r6:84b7a580 r5:85108c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4795fb0 to 0xe4795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b71680 INFO: task kworker/0:211:3855 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ab3bc000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:212:3857 blocked for more than 463 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:212 state:D stack:0 pid:3857 tgid:3857 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e479dd84 r8:00000002 r7:60000113 r6:e479dd8c r5:85108000 r4:85108000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85108000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e479de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b71bc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85108000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff13000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8507a38c r4:8507a000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8507a38c r4:84b67980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85108000 r8:84b679ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b67980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b67980 r8:8027ed34 r7:e0761e60 r6:84b7a600 r5:85108000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe479dfb0 to 0xe479dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b71980 INFO: task kworker/0:212:3857 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ab692000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:161:3860 blocked for more than 463 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:161 state:D stack:0 pid:3860 tgid:3860 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e4799d84 r8:00000002 r7:60000113 r6:e4799d8c r5:8510a400 r4:8510a400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8510a400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4799e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85097480 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8510a400 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0403000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cff8c r4:850cfc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cff8c r4:84b7a680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8510a400 r8:84b7a6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7a680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7a680 r8:8027ed34 r7:e06ede60 r6:84b7a700 r5:8510a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4799fb0 to 0xe4799ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bdadc0 INFO: task kworker/1:161:3860 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: abdd5000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:213:3862 blocked for more than 463 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:213 state:D stack:0 pid:3862 tgid:3862 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e47a1d84 r8:00000002 r7:60000113 r6:e47a1d8c r5:8510bc00 r4:8510bc00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8510bc00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47a1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b71cc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8510bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04bd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8507a78c r4:8507a400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8507a78c r4:84b67a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8510bc00 r8:84b67a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b67a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b67a00 r8:8027ed34 r7:e0761e60 r6:84b7a780 r5:8510bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47a1fb0 to 0xe47a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b71b80 INFO: task kworker/0:213:3862 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: abdd5000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:162:3864 blocked for more than 463 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:162 state:D stack:0 pid:3864 tgid:3864 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e47a9d84 r8:00000002 r7:60000113 r6:e47a9d8c r5:8510b000 r4:8510b000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8510b000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47a9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850973c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8510b000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03ea000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cfb8c r4:850cf800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cfb8c r4:84b7a800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8510b000 r8:84b7a82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7a800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7a800 r8:8027ed34 r7:e4799e60 r6:84b7a880 r5:8510b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47a9fb0 to 0xe47a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bdf140 INFO: task kworker/1:162:3864 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ac3a2000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:214:3866 blocked for more than 463 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:214 state:D stack:0 pid:3866 tgid:3866 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e05a1d84 r8:00000002 r7:60000113 r6:e05a1d8c r5:8498d400 r4:8498d400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8498d400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05a1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b71dc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8498d400 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04c9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8507ab8c r4:8507a800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8507ab8c r4:84b67a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8498d400 r8:84b67aac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b67a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b67a80 r8:8027ed34 r7:e0761e60 r6:84b67b00 r5:8498d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05a1fb0 to 0xe05a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b71d40 INFO: task kworker/0:214:3866 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ac765000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:215:3867 blocked for more than 463 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:215 state:D stack:0 pid:3867 tgid:3867 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e47a5d84 r8:00000002 r7:60000113 r6:e47a5d8c r5:8498ec00 r4:8498ec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8498ec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47a5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b71f40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8498ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04d9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8507af8c r4:8507ac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8507af8c r4:84b67b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8498ec00 r8:84b67bac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b67b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b67b80 r8:8027ed34 r7:e0761e60 r6:84b67c00 r5:8498ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47a5fb0 to 0xe47a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b71940 INFO: task kworker/0:215:3867 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: aca56000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:216:3870 blocked for more than 463 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:216 state:D stack:0 pid:3870 tgid:3870 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e47add84 r8:00000002 r7:60000013 r6:e47add8c r5:8498e000 r4:8498e000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8498e000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47ade08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9080 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8498e000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8507bb8c r4:8507b800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8507bb8c r4:84b67d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8498e000 r8:84b67d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b67d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b67d00 r8:8027ed34 r7:e0761e60 r6:84b67c80 r5:8498e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47adfb0 to 0xe47adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b73d00 INFO: task kworker/0:216:3870 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ad231000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:217:3871 blocked for more than 463 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:217 state:D stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0755d84 r8:00000002 r7:60000013 r6:e0755d8c r5:8498c800 r4:8498c800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8498c800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0755e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8335fd00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8498c800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e050f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8507b78c r4:8507b400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8507b78c r4:84b67d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8498c800 r8:84b67dac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b67d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b67d80 r8:8027ed34 r7:e47ade60 r6:84b67e00 r5:8498c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0755fb0 to 0xe0755ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b71ac0 INFO: task kworker/0:217:3871 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ad327000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:218:3874 blocked for more than 463 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:218 state:D stack:0 pid:3874 tgid:3874 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e47bdd84 r8:00000002 r7:60000013 r6:e47bdd8c r5:8498b000 r4:8498b000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8498b000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47bde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8498b000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e053f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8507bf8c r4:8507bc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8507bf8c r4:84b67e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8498b000 r8:84b67eac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b67e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b67e80 r8:8027ed34 r7:e47ade60 r6:84b67f00 r5:8498b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47bdfb0 to 0xe47bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be9040 INFO: task kworker/0:218:3874 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ad4b2000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:219:3876 blocked for more than 463 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:219 state:D stack:0 pid:3876 tgid:3876 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e47e5d84 r8:00000002 r7:60000013 r6:e47e5d8c r5:83c4ec00 r4:83c4ec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83c4ec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47e5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9380 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83c4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e054d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513038c r4:85130000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513038c r4:84b67f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83c4ec00 r8:84b67fac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b67f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b67f80 r8:8027ed34 r7:e47bde60 r6:84bed000 r5:83c4ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47e5fb0 to 0xe47e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be9180 INFO: task kworker/0:219:3876 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ad4b2000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:220:3878 blocked for more than 463 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:220 state:D stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0001d84 r8:00000002 r7:60000013 r6:e0001d8c r5:8510e000 r4:8510e000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8510e000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0001e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9640 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8510e000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaf1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85130b8c r4:85130800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85130b8c r4:84bed080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8510e000 r8:84bed0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bed080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed080 r8:8027ed34 r7:e47e5e60 r6:84b7a900 r5:8510e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0001fb0 to 0xe0001ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be9340 INFO: task kworker/0:220:3878 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: af0fd000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:221:3879 blocked for more than 464 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:221 state:D stack:0 pid:3879 tgid:3879 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e06a5d84 r8:00000002 r7:60000113 r6:e06a5d8c r5:8510d400 r4:8510d400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8510d400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be95c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8510d400 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df981000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513078c r4:85130400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513078c r4:84bed100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8510d400 r8:84bed12c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bed100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed100 r8:8027ed34 r7:e0001e60 r6:84b7a980 r5:8510d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a5fb0 to 0xe06a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be9340 INFO: task kworker/0:221:3879 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: afadc000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:222:3881 blocked for more than 464 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:222 state:D stack:0 pid:3881 tgid:3881 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e47edd84 r8:00000002 r7:60000113 r6:e47edd8c r5:8510ec00 r4:8510ec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8510ec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47ede08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8510ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb39000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85130f8c r4:85130c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85130f8c r4:84bed180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8510ec00 r8:84bed1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bed180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed180 r8:8027ed34 r7:e0001e60 r6:84b7aa00 r5:8510ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47edfb0 to 0xe47edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be97c0 INFO: task kworker/0:222:3881 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: afeaa000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:223:3884 blocked for more than 464 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:223 state:D stack:0 pid:3884 tgid:3884 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e47f9d84 r8:00000002 r7:60000113 r6:e47f9d8c r5:8510c800 r4:8510c800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8510c800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47f9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9900 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8510c800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbe1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513138c r4:85131000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513138c r4:84bed200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8510c800 r8:84bed22c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bed200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed200 r8:8027ed34 r7:e47ede60 r6:84b7aa80 r5:8510c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47f9fb0 to 0xe47f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be97c0 INFO: task kworker/0:223:3884 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b012b000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:224:3885 blocked for more than 464 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:224 state:D stack:0 pid:3885 tgid:3885 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e8805d84 r8:00000002 r7:60000013 r6:e8805d8c r5:85106c00 r4:85106c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85106c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8805e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9a80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85106c00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc21000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513178c r4:85131400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513178c r4:84bed280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85106c00 r8:84bed2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bed280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed280 r8:8027ed34 r7:e47f9e60 r6:84b7ab00 r5:85106c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8805fb0 to 0xe8805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be97c0 INFO: task kworker/0:224:3885 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b02fc000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:225:3888 blocked for more than 464 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:225 state:D stack:0 pid:3888 tgid:3888 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e880dd84 r8:00000002 r7:60000113 r6:e880dd8c r5:847e1800 r4:847e1800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847e1800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e880de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9c40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccf000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85131f8c r4:85131c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85131f8c r4:84bed300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e1800 r8:84bed32c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bed300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed300 r8:8027ed34 r7:e8805e60 r6:84b7ab80 r5:847e1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe880dfb0 to 0xe880dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be9840 INFO: task kworker/0:225:3888 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b02fc000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:226:3890 blocked for more than 464 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:226 state:D stack:0 pid:3890 tgid:3890 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e47e9d84 r8:00000002 r7:60000113 r6:e47e9d8c r5:847f8000 r4:847f8000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847f8000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47e9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9b80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc8b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85131b8c r4:85131800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85131b8c r4:84bed380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847f8000 r8:84bed3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bed380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed380 r8:8027ed34 r7:e880de60 r6:84bed400 r5:847f8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47e9fb0 to 0xe47e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be99c0 INFO: task kworker/0:226:3890 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b09c6000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:227:3893 blocked for more than 464 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:227 state:D stack:0 pid:3893 tgid:3893 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e8811d84 r8:00000002 r7:60000013 r6:e8811d8c r5:847f9800 r4:847f9800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847f9800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8811e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85080900 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513838c r4:85138000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513838c r4:84bed480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847f9800 r8:84bed4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bed480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed480 r8:8027ed34 r7:e880de60 r6:84bed500 r5:847f9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8811fb0 to 0xe8811ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be9c80 INFO: task kworker/0:227:3893 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b112f000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:228:3894 blocked for more than 464 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:228 state:D stack:0 pid:3894 tgid:3894 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e8821d84 r8:00000002 r7:60000013 r6:e8821d8c r5:847e3000 r4:847e3000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847e3000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8821e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9e80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff63000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513238c r4:85132000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513238c r4:84bed580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:84bed5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bed580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed580 r8:8027ed34 r7:e8811e60 r6:84b7ac00 r5:847e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8821fb0 to 0xe8821ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be9c80 INFO: task kworker/0:228:3894 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b1742000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:229:3896 blocked for more than 464 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:229 state:D stack:0 pid:3896 tgid:3896 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e8829d84 r8:00000002 r7:60000113 r6:e8829d8c r5:847e2400 r4:847e2400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847e2400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8829e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85080040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff7b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513278c r4:85132400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513278c r4:84bed600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e2400 r8:84bed62c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bed600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed600 r8:8027ed34 r7:e8811e60 r6:84b7ac80 r5:847e2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8829fb0 to 0xe8829ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85080080 INFO: task kworker/0:229:3896 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b1d23000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:230:3898 blocked for more than 464 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:230 state:D stack:0 pid:3898 tgid:3898 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e8831d84 r8:00000002 r7:60000113 r6:e8831d8c r5:847e0c00 r4:847e0c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847e0c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8831e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85080200 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0017000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85132b8c r4:85132800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85132b8c r4:84bed680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e0c00 r8:84bed6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bed680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed680 r8:8027ed34 r7:e8811e60 r6:84b7ad00 r5:847e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8831fb0 to 0xe8831ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85080080 INFO: task kworker/0:230:3898 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b247c000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:231:3900 blocked for more than 464 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:231 state:D stack:0 pid:3900 tgid:3900 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e8839d84 r8:00000002 r7:60000113 r6:e8839d8c r5:847e3c00 r4:847e3c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847e3c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8839e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850802c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0025000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85132f8c r4:85132c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85132f8c r4:84bed700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3c00 r8:84bed72c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bed700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed700 r8:8027ed34 r7:e8811e60 r6:84b7ad80 r5:847e3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8839fb0 to 0xe8839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850801c0 INFO: task kworker/0:231:3900 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b2a22000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:232:3902 blocked for more than 464 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:232 state:D stack:0 pid:3902 tgid:3902 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e8841d84 r8:00000002 r7:60000013 r6:e8841d8c r5:847e6000 r4:847e6000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847e6000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8841e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85080440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513338c r4:85133000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513338c r4:84bed780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e6000 r8:84bed7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bed780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed780 r8:8027ed34 r7:e8811e60 r6:84b7ae00 r5:847e6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8841fb0 to 0xe8841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85080300 INFO: task kworker/0:232:3902 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b2bbe000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:233:3904 blocked for more than 464 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:233 state:D stack:0 pid:3904 tgid:3904 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e8849d84 r8:00000002 r7:60000113 r6:e8849d8c r5:847e5400 r4:847e5400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847e5400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8849e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85080540 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e006f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513378c r4:85133400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513378c r4:84bed800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e5400 r8:84bed82c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bed800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed800 r8:8027ed34 r7:e8811e60 r6:84b7ae80 r5:847e5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8849fb0 to 0xe8849ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85080680 INFO: task kworker/0:233:3904 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b2bbe000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:234:3906 blocked for more than 464 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:234 state:D stack:0 pid:3906 tgid:3906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e8851d84 r8:00000002 r7:60000113 r6:e8851d8c r5:847e4800 r4:847e4800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847e4800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8851e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85080700 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0093000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85133b8c r4:85133800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85133b8c r4:84bed880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e4800 r8:84bed8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bed880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed880 r8:8027ed34 r7:e8811e60 r6:84b7af00 r5:847e4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8851fb0 to 0xe8851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850804c0 INFO: task kworker/0:234:3906 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b3096000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:235:3908 blocked for more than 464 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:235 state:D stack:0 pid:3908 tgid:3908 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e8859d84 r8:00000002 r7:60000113 r6:e8859d8c r5:847e6c00 r4:847e6c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847e6c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8859e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850807c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00ab000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85133f8c r4:85133c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85133f8c r4:84bed900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e6c00 r8:84bed92c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bed900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed900 r8:8027ed34 r7:e8811e60 r6:84b7af80 r5:847e6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8859fb0 to 0xe8859ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850806c0 INFO: task kworker/0:235:3908 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b3520000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:236:3910 blocked for more than 464 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:236 state:D stack:0 pid:3910 tgid:3910 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e885dd84 r8:00000002 r7:60000113 r6:e885dd8c r5:847e0000 r4:847e0000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847e0000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e885de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85080c00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e043f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85138b8c r4:85138800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85138b8c r4:84bed980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e0000 r8:84bed9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bed980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bed980 r8:8027ed34 r7:e8811e60 r6:8509e000 r5:847e0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe885dfb0 to 0xe885dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85080940 INFO: task kworker/0:236:3910 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b371e000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:237:3913 blocked for more than 464 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:237 state:D stack:0 pid:3913 tgid:3913 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e8855d84 r8:00000002 r7:60000113 r6:e8855d8c r5:85109800 r4:85109800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85109800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8855e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85080b80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85109800 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e041f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513878c r4:85138400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513878c r4:84beda00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85109800 r8:84beda2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84beda00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84beda00 r8:8027ed34 r7:e885de60 r6:8509e080 r5:85109800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8855fb0 to 0xe8855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85080a80 INFO: task kworker/0:237:3913 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b39f2000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:163:3914 blocked for more than 464 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:163 state:D stack:0 pid:3914 tgid:3914 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e8815d84 r8:00000002 r7:60000113 r6:e8815d8c r5:85110000 r4:85110000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85110000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8815e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85110000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e882d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ea38c r4:850ea000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ea38c r4:8509e100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85110000 r8:8509e12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8509e100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509e100 r8:8027ed34 r7:e4799e60 r6:8509e180 r5:85110000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8815fb0 to 0xe8815ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850974c0 INFO: task kworker/1:163:3914 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b3b4a000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:164:3916 blocked for more than 465 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:164 state:D stack:0 pid:3916 tgid:3916 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e8861d84 r8:00000002 r7:60000113 r6:e8861d8c r5:85110c00 r4:85110c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85110c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8861e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ab3c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85110c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0607000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e838c r4:850e8000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850e838c r4:8509e200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85110c00 r8:8509e22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8509e200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509e200 r8:8027ed34 r7:e8815e60 r6:8509e280 r5:85110c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8861fb0 to 0xe8861ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850974c0 INFO: task kworker/1:164:3916 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b4013000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:238:3919 blocked for more than 465 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:238 state:D stack:0 pid:3919 tgid:3919 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e886dd84 r8:00000002 r7:60000013 r6:e886dd8c r5:85113000 r4:85113000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85113000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e886de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b73180 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85113000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0479000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513978c r4:85139400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513978c r4:84beda80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85113000 r8:84bedaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84beda80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84beda80 r8:8027ed34 r7:e885de60 r6:8509e300 r5:85113000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe886dfb0 to 0xe886dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85080cc0 INFO: task kworker/0:238:3919 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b4013000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:239:3920 blocked for more than 465 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:239 state:D stack:0 pid:3920 tgid:3920 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e8871d84 r8:00000002 r7:60000013 r6:e8871d8c r5:85113c00 r4:85113c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85113c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8871e08 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85080cc0 INFO: task kworker/0:239:3920 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b42a0000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:240:3922 blocked for more than 465 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:240 state:D stack:0 pid:3922 tgid:3922 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea885d84 r8:00000002 r7:60000113 r6:ea885d8c r5:85112400 r4:85112400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85112400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea885e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85080e80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85112400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0469000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513938c r4:85139000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513938c r4:84bedb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85112400 r8:84bedbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bedb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bedb80 r8:8027ed34 r7:e886de60 r6:8509e400 r5:85112400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea885fb0 to 0xea885ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85080d00 INFO: task kworker/0:240:3922 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b47bf000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b47e3000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:242:3927 blocked for more than 465 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:242 state:D stack:0 pid:3927 tgid:3927 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea8a1d84 r8:00000002 r7:60000113 r6:ea8a1d8c r5:85116000 r4:85116000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85116000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8a1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85092400 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85116000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0585000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513ab8c r4:8513a800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513ab8c r4:84bedc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85116000 r8:84bedcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bedc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bedc80 r8:8027ed34 r7:ea899e60 r6:8509e500 r5:85116000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8a1fb0 to 0xea8a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be9f40 INFO: task kworker/0:242:3927 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b4ce6000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:243:3928 blocked for more than 465 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:243 state:D stack:0 pid:3928 tgid:3928 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea8a5d84 r8:00000002 r7:60000113 r6:ea8a5d8c r5:85115400 r4:85115400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85115400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8a5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85092040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85115400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04a5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85139f8c r4:85139c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85139f8c r4:84bedd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85115400 r8:84bedd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bedd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bedd00 r8:8027ed34 r7:ea8a1e60 r6:8509e580 r5:85115400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8a5fb0 to 0xea8a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850920c0 INFO: task kworker/0:243:3928 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b50d6000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc2-syzkaller #0 r10:829185c4 r9:ea8add84 r8:00000002 r7:60000013 r6:ea8add8c r5:85114800 [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85114800 r8:84bede2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bede00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bede00 r8:8027ed34 r7:ea8a1e60 r6:8509e600 r5:85114800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8adfb0 to 0xea8adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850922c0 INFO: task kworker/0:244:3930 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b51a5000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:245:3932 blocked for more than 465 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:245 state:D stack:0 pid:3932 tgid:3932 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea8b5d84 r8:00000002 r7:60000113 r6:ea8b5d8c r5:85118c00 r4:85118c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85118c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8b5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85092340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85118c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e056d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513a78c r4:8513a400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513a78c r4:84bedd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85118c00 r8:84beddac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bedd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bedd80 r8:8027ed34 r7:ea8a1e60 r6:8509e680 r5:85118c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8b5fb0 to 0xea8b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85092140 INFO: task kworker/0:245:3932 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b5686000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:246:3935 blocked for more than 465 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:246 state:D stack:0 pid:3935 tgid:3935 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea8c5d84 r8:00000002 r7:60000113 r6:ea8c5d8c r5:8511a400 r4:8511a400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8511a400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8c5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850928c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8511a400 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05d9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513b78c r4:8513b400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513b78c r4:84bede80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8511a400 r8:84bedeac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bede80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bede80 r8:8027ed34 r7:ea8a1e60 r6:8509e700 r5:8511a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8c5fb0 to 0xea8c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85092440 INFO: task kworker/0:246:3935 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b5d61000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:247:3936 blocked for more than 465 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:247 state:D stack:0 pid:3936 tgid:3936 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea8c9d84 r8:00000002 r7:60000113 r6:ea8c9d8c r5:8511b000 r4:8511b000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8511b000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8c9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85092600 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8511b000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0599000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513af8c r4:8513ac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513af8c r4:84bedf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8511b000 r8:84bedf2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bedf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bedf00 r8:8027ed34 r7:ea8c5e60 r6:8509e780 r5:8511b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8c9fb0 to 0xea8c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85092440 INFO: task kworker/0:247:3936 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b5e7a000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:248:3938 blocked for more than 465 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:248 state:D stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea8d1d84 r8:00000002 r7:60000013 r6:ea8d1d8c r5:8511c800 r4:8511c800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8511c800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8d1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850926c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8511c800 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05c3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513b38c r4:8513b000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513b38c r4:84bedf80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8511c800 r8:84bedfac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bedf80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bedf80 r8:8027ed34 r7:ea8c5e60 r6:8509e800 r5:8511c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8d1fb0 to 0xea8d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85092540 INFO: task kworker/0:248:3938 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b6220000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:249:3940 blocked for more than 465 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:249 state:D stack:0 pid:3940 tgid:3940 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea8d5d84 r8:00000002 r7:60000013 r6:ea8d5d8c r5:85119800 r4:85119800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85119800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8d5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85092c00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85119800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0645000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513bf8c r4:8513bc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513bf8c r4:850a7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85119800 r8:850a702c r7:82804d40 r6:dddced40 r5:dddced60 r4:850a7000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a7000 r8:8027ed34 r7:ea8c5e60 r6:8509e880 r5:85119800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8d5fb0 to 0xea8d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85092700 INFO: task kworker/0:249:3940 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b652b000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:250:3941 blocked for more than 465 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:250 state:D stack:0 pid:3941 tgid:3941 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea8d9d84 r8:00000002 r7:60000113 r6:ea8d9d8c r5:8511d400 r4:8511d400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8511d400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8d9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85092b00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8511d400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e062f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8513bb8c r4:8513b800 r7:dddced40 r6:83018000 r5:8513bb8c r4:850a7080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8511d400 r8:850a70ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850a7080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a7080 r8:8027ed34 r7:ea8d5e60 r6:8509e900 r5:8511d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8d9fb0 to 0xea8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85092a00 INFO: task kworker/0:250:3941 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d60: 80070113 ffffffff r4:dffd5dc0 r4:00000000 r5:00001000 r4:dfea3000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:165 state:D stack:0 pid:3945 tgid:3945 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8511e000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e061d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e878c r4:850e8400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850e878c r4:8509e980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8511e000 r8:8509e9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8509e980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509e980 r8:8027ed34 r7:e8815e60 r6:8509ea00 r5:8511e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8cdfb0 to 0xea8cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850ab440 INFO: task kworker/1:165:3945 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r5:00001000 r4:dfea3000 r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:166 state:D stack:0 pid:3946 tgid:3946 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8865e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85172d80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8511ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0685000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e938c r4:850e9000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850e938c r4:8509ea80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8511ec00 r8:8509eaac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8509ea80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8509ea80 r8:8027ed34 r7:e8815e60 r6:8509eb00 r5:8511ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8865fb0 to 0xe8865ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850ab440 INFO: task kworker/1:166:3946 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b720d000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:251:3948 blocked for more than 465 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:251 state:D stack:0 pid:3948 tgid:3948 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea8e1d84 r8:00000002 r7:60000113 r6:ea8e1d8c r5:8511bc00 r4:8511bc00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8511bc00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8e1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ab780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8511bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0655000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e8b8c r4:850e8800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850e8b8c r4:850a7100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8511bc00 r8:850a712c r7:82804d40 r6:dddced40 r5:dddced60 r4:850a7100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a7100 r8:8027ed34 r7:ea8d5e60 r6:8509eb80 r5:8511bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8e1fb0 to 0xea8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85092c80 INFO: task kworker/0:251:3948 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b7266000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:252:3951 blocked for more than 465 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:252 state:D stack:0 pid:3951 tgid:3951 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e0681d84 r8:00000002 r7:60000013 r6:e0681d8c r5:85118000 r4:85118000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85118000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0681e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85092e80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85118000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9d5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513c78c r4:8513c400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513c78c r4:850a7180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85118000 r8:850a71ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850a7180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a7180 r8:8027ed34 r7:ea8e1e60 r6:8509ec00 r5:85118000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0681fb0 to 0xe0681ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85092b80 INFO: task kworker/0:252:3951 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b82ae000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 r10:00000000 r9:850a7200 r8:8027ed34 r7:e0681e60 r6:8509ec80 r5:85120000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe072dfb0 to 0xe072dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85092d40 INFO: task kworker/0:253:3953 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b8994000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b90a1000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e071dd84 r8:00000002 r7:60000113 r6:e071dd8c r5:847fd400 r4:847fd400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847fd400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e071de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85092f40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaaf000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513cf8c r4:8513cc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513cf8c r4:850a7380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847fd400 r8:850a73ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850a7380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a7380 r8:8027ed34 r7:ea8dde60 r6:850a7400 r5:847fd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r5:8513d38c r4:8513d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513d38c r4:850a7480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847fe000 r8:850a74ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850a7480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a7480 r8:8027ed34 r7:e071de60 r6:850a7500 r5:847fe000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4785fb0 to 0xe4785ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85092cc0 INFO: task kworker/0:256:3958 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: b9dfd000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r4:850a7580 r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:258:3963 blocked for more than 466 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8e5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513db8c r4:8513d800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513db8c r4:850a7680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847fbc00 r8:850a76ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850a7680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a7680 r8:8027ed34 r7:e0765e60 r6:850a7700 r5:847fbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8e5fb0 to 0xea8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdffd5d20 to 0xdffd5d68) r4:82abf1e4 r4:dffd5dc0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:259:3965 blocked for more than 466 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:259 state:D stack:0 pid:3965 tgid:3965 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea8f1d84 r8:00000002 r7:60000113 r6:ea8f1d8c r5:85122400 r4:85122400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85122400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8f1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850aa400 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85122400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe19000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513df8c r4:8513dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513df8c r4:850a7780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85122400 r8:850a77ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850a7780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a7780 r8:8027ed34 r7:ea8e5e60 r6:8509ed00 r5:85122400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8f1fb0 to 0xea8f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850aa280 INFO: task kworker/0:259:3965 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ba58f000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:260:3967 blocked for more than 466 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:260 state:D stack:0 pid:3967 tgid:3967 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea8f9d84 r8:00000002 r7:60000013 r6:ea8f9d8c r5:85123000 r4:85123000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85123000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8f9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850aad00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85123000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04db000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513fb8c r4:8513f800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513fb8c r4:850a7800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85123000 r8:850a782c r7:82804d40 r6:dddced40 r5:dddced60 r4:850a7800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a7800 r8:8027ed34 r7:ea8f1e60 r6:8509ed80 r5:85123000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8f9fb0 to 0xea8f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850aa440 INFO: task kworker/0:260:3967 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ba8df000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:261:3968 blocked for more than 466 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:261 state:D stack:0 pid:3968 tgid:3968 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea901d84 r8:00000002 r7:60000113 r6:ea901d8c r5:85121800 r4:85121800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85121800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea901e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850aa540 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85121800 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe53000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513e38c r4:8513e000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513e38c r4:850a7880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85121800 r8:850a78ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850a7880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a7880 r8:8027ed34 r7:ea8f9e60 r6:8509ee00 r5:85121800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea901fb0 to 0xea901ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850aa440 INFO: task kworker/0:261:3968 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ba9cb000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:262:3970 blocked for more than 466 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:262 state:D stack:0 pid:3970 tgid:3970 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea909d84 r8:00000002 r7:60000113 r6:ea909d8c r5:85120c00 r4:85120c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85120c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea909e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850aa740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85120c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe8f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513e78c r4:8513e400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513e78c r4:850a7900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85120c00 r8:850a792c r7:82804d40 r6:dddced40 r5:dddced60 r4:850a7900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a7900 r8:8027ed34 r7:ea8f9e60 r6:8509ee80 r5:85120c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea909fb0 to 0xea909ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850aa580 INFO: task kworker/0:262:3970 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ba9cb000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:263:3972 blocked for more than 466 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:263 state:D stack:0 pid:3972 tgid:3972 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea911d84 r8:00000002 r7:60000113 r6:ea911d8c r5:85125400 r4:85125400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85125400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea911e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850aa8c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85125400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfec1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513eb8c r4:8513e800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513eb8c r4:850a7980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85125400 r8:850a79ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850a7980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a7980 r8:8027ed34 r7:ea8f9e60 r6:8509ef00 r5:85125400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea911fb0 to 0xea911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850aa680 INFO: task kworker/0:263:3972 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: bbc9a000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:264:3974 blocked for more than 466 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:264 state:D stack:0 pid:3974 tgid:3974 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea919d84 r8:00000002 r7:60000113 r6:ea919d8c r5:85126000 r4:85126000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85126000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea919e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850aa9c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85126000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeed000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513ef8c r4:8513ec00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513ef8c r4:850a7a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85126000 r8:850a7a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:850a7a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a7a00 r8:8027ed34 r7:ea8f9e60 r6:8509ef80 r5:85126000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea919fb0 to 0xea919ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850aa800 INFO: task kworker/0:264:3974 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: bce3a000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:265:3976 blocked for more than 466 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:265 state:D stack:0 pid:3976 tgid:3976 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea925d84 r8:00000002 r7:60000113 r6:ea925d8c r5:85123c00 r4:85123c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85123c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea925e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850aaa80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85123c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff25000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513f38c r4:8513f000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513f38c r4:850a7a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85123c00 r8:850a7aac r7:82804d40 r6:dddced40 r5:dddced60 r4:850a7a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a7a80 r8:8027ed34 r7:ea8f9e60 r6:85176000 r5:85123c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea925fb0 to 0xea925ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850aa940 INFO: task kworker/0:265:3976 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: bd057000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:266:3978 blocked for more than 467 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513f78c r4:8513f400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513f78c r4:850a7b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85126c00 r8:850a7b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:850a7b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a7b00 r8:8027ed34 r7:ea8f9e60 r6:85176080 r5:85126c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea92dfb0 to 0xea92dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850aaac0 INFO: task kworker/0:266:3978 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: bd7b8000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:267:3980 blocked for more than 467 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:267 state:D stack:0 pid:3980 tgid:3980 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea935d84 r8:00000002 r7:60000013 r6:ea935d8c r5:85128000 r4:85128000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85128000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea935e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517e000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85128000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05bf000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85140b8c r4:85140800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85140b8c r4:850a7b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85128000 r8:850a7bac r7:82804d40 r6:dddced40 r5:dddced60 r4:850a7b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a7b80 r8:8027ed34 r7:ea8f9e60 r6:85176100 r5:85128000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea935fb0 to 0xea935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850aac00 INFO: task kworker/0:267:3980 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: bdc9d000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:268:3982 blocked for more than 467 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:268 state:D stack:0 pid:3982 tgid:3982 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea93dd84 r8:00000002 r7:60000013 r6:ea93dd8c r5:85129800 r4:85129800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85129800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea93de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdf3c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85129800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04f5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513ff8c r4:8513fc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8513ff8c r4:850a7c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85129800 r8:850a7c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:850a7c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a7c00 r8:8027ed34 r7:ea935e60 r6:85176180 r5:85129800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea93dfb0 to 0xea93dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850aad40 INFO: task kworker/0:268:3982 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: be31c000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:269:3984 blocked for more than 467 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:269 state:D stack:0 pid:3984 tgid:3984 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea945d84 r8:00000002 r7:60000013 r6:ea945d8c r5:85128c00 r4:85128c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85128c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea945e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850abe00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85128c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0537000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514038c r4:85140000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8514038c r4:850a7c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85128c00 r8:850a7cac r7:82804d40 r6:dddced40 r5:dddced60 r4:850a7c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a7c80 r8:8027ed34 r7:ea935e60 r6:85176200 r5:85128c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea945fb0 to 0xea945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850aae40 INFO: task kworker/0:269:3984 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: be779000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:270:3986 blocked for more than 467 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:270 state:D stack:0 pid:3986 tgid:3986 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea94dd84 r8:00000002 r7:60000013 r6:ea94dd8c r5:8512a400 r4:8512a400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8512a400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea94de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850abd40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8512a400 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e054b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514078c r4:85140400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8514078c r4:850a7d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8512a400 r8:850a7d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:850a7d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a7d00 r8:8027ed34 r7:ea935e60 r6:85176280 r5:8512a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea94dfb0 to 0xea94dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850abe40 INFO: task kworker/0:270:3986 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: beeb1000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:271:3989 blocked for more than 467 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:271 state:D stack:0 pid:3989 tgid:3989 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea951d84 r8:00000002 r7:60000113 r6:ea951d8c r5:8512bc00 r4:8512bc00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8512bc00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea951e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517e280 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8512bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0665000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85140f8c r4:85140c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85140f8c r4:850a7d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8512bc00 r8:850a7dac r7:82804d40 r6:dddced40 r5:dddced60 r4:850a7d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a7d80 r8:8027ed34 r7:ea935e60 r6:85176300 r5:8512bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea951fb0 to 0xea951ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517e100 INFO: task kworker/0:271:3989 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: bf302000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:272:3991 blocked for more than 467 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:272 state:D stack:0 pid:3991 tgid:3991 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea949d84 r8:00000002 r7:60000013 r6:ea949d8c r5:8512c800 r4:8512c800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8512c800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea949e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517e500 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8512c800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514178c r4:85141400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8514178c r4:850a7e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8512c800 r8:850a7e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:850a7e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a7e00 r8:8027ed34 r7:ea951e60 r6:85176380 r5:8512c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea949fb0 to 0xea949ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517e140 INFO: task kworker/0:272:3991 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: bf641000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:273:3993 blocked for more than 467 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:273 state:D stack:0 pid:3993 tgid:3993 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea955d84 r8:00000002 r7:60000013 r6:ea955d8c r5:8512d400 r4:8512d400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8512d400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea955e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517e400 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8512d400 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0671000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514138c r4:85141000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8514138c r4:850a7e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8512d400 r8:850a7eac r7:82804d40 r6:dddced40 r5:dddced60 r4:850a7e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a7e80 r8:8027ed34 r7:ea949e60 r6:85176400 r5:8512d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea955fb0 to 0xea955ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517e100 INFO: task kworker/0:273:3993 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: bffc1000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:167:3996 blocked for more than 467 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:167 state:D stack:0 pid:3996 tgid:3996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea8e9d84 r8:00000002 r7:60000113 r6:ea8e9d8c r5:8512e000 r4:8512e000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8512e000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8e9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85233040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8512e000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff85000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e9b8c r4:850e9800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850e9b8c r4:85176480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8512e000 r8:851764ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85176480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85176480 r8:8027ed34 r7:e8815e60 r6:85176500 r5:8512e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8e9fb0 to 0xea8e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85172d40 INFO: task kworker/1:167:3996 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c0293000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:274:3998 blocked for more than 467 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:274 state:D stack:0 pid:3998 tgid:3998 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea95dd84 r8:00000002 r7:60000013 r6:ea95dd8c r5:8512b000 r4:8512b000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8512b000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea95de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517e6c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8512b000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06f7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85141f8c r4:85141c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85141f8c r4:850a7f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8512b000 r8:850a7f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:850a7f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a7f00 r8:8027ed34 r7:ea949e60 r6:85176580 r5:8512b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea95dfb0 to 0xea95dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517e480 INFO: task kworker/0:274:3998 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c0797000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:275:4001 blocked for more than 467 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:275 state:D stack:0 pid:4001 tgid:4001 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea969d84 r8:00000002 r7:60000113 r6:ea969d8c r5:851e8000 r4:851e8000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851e8000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea969e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517e600 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:851e8000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06a9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85141b8c r4:85141800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85141b8c r4:850a7f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851e8000 r8:850a7fac r7:82804d40 r6:dddced40 r5:dddced60 r4:850a7f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850a7f80 r8:8027ed34 r7:ea95de60 r6:85176600 r5:851e8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea969fb0 to 0xea969ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517e580 INFO: task kworker/0:275:4001 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c0b3e000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:276:4002 blocked for more than 467 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:276 state:D stack:0 pid:4002 tgid:4002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea96dd84 r8:00000002 r7:60000113 r6:ea96dd8c r5:851e8c00 r4:851e8c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851e8c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea96de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517ea00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:851e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0737000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514278c r4:85142400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8514278c r4:8517f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851e8c00 r8:8517f02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8517f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517f000 r8:8027ed34 r7:ea95de60 r6:85176680 r5:851e8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea96dfb0 to 0xea96dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517e700 INFO: task kworker/0:276:4002 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c0f70000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:277:4003 blocked for more than 467 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:277 state:D stack:0 pid:4003 tgid:4003 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e076dd84 r8:00000002 r7:60000113 r6:e076dd8c r5:847fa400 r4:847fa400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847fa400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e076de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517e800 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847fa400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0701000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514238c r4:85142000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8514238c r4:8517f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847fa400 r8:8517f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8517f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517f080 r8:8027ed34 r7:ea96de60 r6:8517f100 r5:847fa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe076dfb0 to 0xe076dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517e700 INFO: task kworker/0:277:4003 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c1d39000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:278:4007 blocked for more than 467 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:278 state:D stack:0 pid:4007 tgid:4007 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea965d84 r8:00000002 r7:60000113 r6:ea965d8c r5:847f8c00 r4:847f8c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847f8c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea965e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517eac0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0741000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85142b8c r4:85142800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85142b8c r4:8517f180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847f8c00 r8:8517f1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8517f180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517f180 r8:8027ed34 r7:ea96de60 r6:8517f200 r5:847f8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea965fb0 to 0xea965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517e940 INFO: task kworker/0:278:4007 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c1fe6000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:279:4008 blocked for more than 467 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:279 state:D stack:0 pid:4008 tgid:4008 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea975d84 r8:00000002 r7:60000113 r6:ea975d8c r5:847fb000 r4:847fb000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847fb000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea975e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517ed80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:847fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4781000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85142f8c r4:85142c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85142f8c r4:8517f280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847fb000 r8:8517f2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8517f280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517f280 r8:8027ed34 r7:ea965e60 r6:8517f300 r5:847fb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea975fb0 to 0xea975ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517eb00 INFO: task kworker/0:279:4008 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c2b1e000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:280:4009 blocked for more than 467 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:280 state:D stack:0 pid:4009 tgid:4009 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea959d84 r8:00000002 r7:60000113 r6:ea959d8c r5:84808000 r4:84808000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84808000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea959e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517ee40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84808000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47af000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514338c r4:85143000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8514338c r4:8517f380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84808000 r8:8517f3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8517f380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517f380 r8:8027ed34 r7:ea975e60 r6:8517f400 r5:84808000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea959fb0 to 0xea959ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517eb00 INFO: task kworker/0:280:4009 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c3183000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:281:4012 blocked for more than 467 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:281 state:D stack:0 pid:4012 tgid:4012 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea979d84 r8:00000002 r7:60000013 r6:ea979d8c r5:84808c00 r4:84808c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84808c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea979e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85172740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84808c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47b9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514378c r4:85143400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8514378c r4:8517f480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84808c00 r8:8517f4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8517f480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517f480 r8:8027ed34 r7:ea959e60 r6:8517f500 r5:84808c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea979fb0 to 0xea979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517ee80 INFO: task kworker/0:281:4012 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c331b000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:282:4014 blocked for more than 467 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:282 state:D stack:0 pid:4014 tgid:4014 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea981d84 r8:00000002 r7:60000113 r6:ea981d8c r5:84809800 r4:84809800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84809800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea981e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518b1c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84809800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e887b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85143f8c r4:85143c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85143f8c r4:8517f580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84809800 r8:8517f5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8517f580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517f580 r8:8027ed34 r7:ea979e60 r6:8517f600 r5:84809800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea981fb0 to 0xea981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517efc0 INFO: task kworker/0:282:4014 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c39a8000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:283:4016 blocked for more than 468 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:283 state:D stack:0 pid:4016 tgid:4016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea98dd84 r8:00000002 r7:60000113 r6:ea98dd8c r5:8480a400 r4:8480a400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8480a400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea98de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518b040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8480a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8801000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85143b8c r4:85143800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85143b8c r4:8517f680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8480a400 r8:8517f6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8517f680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517f680 r8:8027ed34 r7:ea981e60 r6:8517f700 r5:8480a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea98dfb0 to 0xea98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518b080 INFO: task kworker/0:283:4016 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c39a8000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:284:4019 blocked for more than 468 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:284 state:D stack:0 pid:4019 tgid:4019 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea991d84 r8:00000002 r7:60000013 r6:ea991d8c r5:8480b000 r4:8480b000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8480b000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea991e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518b780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8480b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9ad000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85148f8c r4:85148c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85148f8c r4:8517f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8480b000 r8:8517f7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8517f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517f780 r8:8027ed34 r7:ea981e60 r6:8517f800 r5:8480b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea991fb0 to 0xea991ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518b180 INFO: task kworker/0:284:4019 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c4902000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:285:4020 blocked for more than 468 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:285 state:D stack:0 pid:4020 tgid:4020 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea995d84 r8:00000002 r7:60000013 r6:ea995d8c r5:8480bc00 r4:8480bc00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8480bc00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea995e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518b280 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8480bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8b9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514838c r4:85148000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8514838c r4:8517f880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8480bc00 r8:8517f8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8517f880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517f880 r8:8027ed34 r7:ea991e60 r6:8517f900 r5:8480bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea995fb0 to 0xea995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518b2c0 INFO: task kworker/0:285:4020 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c4b33000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:286:4022 blocked for more than 468 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:286 state:D stack:0 pid:4022 tgid:4022 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea999d84 r8:00000002 r7:60000013 r6:ea999d8c r5:8480c800 r4:8480c800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8480c800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea999e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518b480 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8480c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea99d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514878c r4:85148400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8514878c r4:8517f980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8480c800 r8:8517f9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8517f980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517f980 r8:8027ed34 r7:ea991e60 r6:8517fa00 r5:8480c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea999fb0 to 0xea999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518b3c0 INFO: task kworker/0:286:4022 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c4e49000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:287:4024 blocked for more than 468 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:287 state:D stack:0 pid:4024 tgid:4024 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea9b1d84 r8:00000002 r7:60000013 r6:ea9b1d8c r5:8480d400 r4:8480d400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8480d400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518b600 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8480d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9a7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85148b8c r4:85148800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85148b8c r4:8517fa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8480d400 r8:8517faac r7:82804d40 r6:dddced40 r5:dddced60 r4:8517fa80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517fa80 r8:8027ed34 r7:ea991e60 r6:8517fb00 r5:8480d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9b1fb0 to 0xea9b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518b500 INFO: task kworker/0:287:4024 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c5a53000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:288:4025 blocked for more than 468 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:288 state:D stack:0 pid:4025 tgid:4025 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea97dd84 r8:00000002 r7:60000113 r6:ea97dd8c r5:8480e000 r4:8480e000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8480e000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea97de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518b980 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8480e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514938c r4:85149000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8514938c r4:8517fb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8480e000 r8:8517fbac r7:82804d40 r6:dddced40 r5:dddced60 r4:8517fb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517fb80 r8:8027ed34 r7:ea991e60 r6:8517fc00 r5:8480e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea97dfb0 to 0xea97dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518b500 INFO: task kworker/0:288:4025 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c5af0000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:289:4029 blocked for more than 468 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:289 state:D stack:0 pid:4029 tgid:4029 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea9b9d84 r8:00000002 r7:60000113 r6:ea9b9d8c r5:8480ec00 r4:8480ec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8480ec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518ba80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8480ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9c1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514978c r4:85149400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8514978c r4:8517fc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8480ec00 r8:8517fcac r7:82804d40 r6:dddced40 r5:dddced60 r4:8517fc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517fc80 r8:8027ed34 r7:ea97de60 r6:8517fd00 r5:8480ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9b9fb0 to 0xea9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518b940 INFO: task kworker/0:289:4029 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c6611000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:290:4030 blocked for more than 468 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:290 state:D stack:0 pid:4030 tgid:4030 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea9c5d84 r8:00000002 r7:60000113 r6:ea9c5d8c r5:84a18000 r4:84a18000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a18000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518bc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a18000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9cf000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85149b8c r4:85149800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85149b8c r4:8517fd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a18000 r8:8517fdac r7:82804d40 r6:dddced40 r5:dddced60 r4:8517fd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517fd80 r8:8027ed34 r7:ea9b9e60 r6:8517fe00 r5:84a18000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9c5fb0 to 0xea9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518b940 INFO: task kworker/0:290:4030 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c693d000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:291:4032 blocked for more than 468 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:291 state:D stack:0 pid:4032 tgid:4032 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea9cdd84 r8:00000002 r7:60000113 r6:ea9cdd8c r5:84a18c00 r4:84a18c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a18c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9cde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518bdc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a18c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9d5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85149f8c r4:85149c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85149f8c r4:8517fe80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a18c00 r8:8517feac r7:82804d40 r6:dddced40 r5:dddced60 r4:8517fe80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517fe80 r8:8027ed34 r7:ea9c5e60 r6:8517ff00 r5:84a18c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9cdfb0 to 0xea9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518bc00 INFO: task kworker/0:291:4032 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c693d000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:292:4034 blocked for more than 468 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:292 state:D stack:0 pid:4034 tgid:4034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea9e5d84 r8:00000002 r7:60000113 r6:ea9e5d8c r5:851ea400 r4:851ea400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851ea400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518be80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:851ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9e7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514a38c r4:8514a000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8514a38c r4:8517ff80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ea400 r8:8517ffac r7:82804d40 r6:dddced40 r5:dddced60 r4:8517ff80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517ff80 r8:8027ed34 r7:ea9cde60 r6:85176700 r5:851ea400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9e5fb0 to 0xea9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518bf00 INFO: task kworker/0:292:4034 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c6d7a000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:293:4036 blocked for more than 468 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:293 state:D stack:0 pid:4036 tgid:4036 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea9f5d84 r8:00000002 r7:60000013 r6:ea9f5d8c r5:851ebc00 r4:851ebc00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851ebc00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a2040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:851ebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9ed000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514a78c r4:8514a400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8514a78c r4:8519f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r5:80070113 r4:80239bd0 r4:dffd5dc0 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84be0e00 Exception stack(0xdffd5fb0 to 0xdffd5ff8) INFO: task kworker/0:294:4038 blocked for more than 468 seconds. r10:829185c4 r9:eaa09d84 r8:00000002 r7:60000013 r6:eaa09d8c r5:851e9800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa09e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a2640 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:851e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa1d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514b78c r4:8514b400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8514b78c r4:8519f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851e9800 r8:8519f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f080 r8:8027ed34 r7:ea9f5e60 r6:85176800 r5:851e9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa09fb0 to 0xeaa09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a2280 INFO: task kworker/0:294:4038 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c80a8000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 INFO: task kworker/0:295:4039 blocked for more than 468 seconds. Workqueue: events bpf_prog_free_deferred [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a19800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a2140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a19800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9ff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514ab8c r4:8514a800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8514ab8c r4:8519f100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a19800 r8:8519f12c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f100 r8:8027ed34 r7:eaa09e60 r6:8519f180 r5:84a19800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d9fb0 to 0xea9d9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a2280 INFO: task kworker/0:295:4039 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c8b54000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:296:4042 blocked for more than 468 seconds. task:kworker/0:296 state:D stack:0 pid:4042 tgid:4042 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829185c4 r9:eaa0dd84 r8:00000002 r7:60000113 r6:eaa0dd8c r5:84a1a400 r4:84a1a400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a1a400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa0de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a2340 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8519f200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f200 r8:8027ed34 r7:eaa09e60 r6:8519f280 r5:84a1a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa0dfb0 to 0xeaa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a2100 INFO: task kworker/0:296:4042 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c965e000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:297:4043 blocked for more than 468 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:297 state:D stack:0 pid:4043 tgid:4043 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea9e1d84 r8:00000002 r7:60000013 r6:ea9e1d8c r5:84a1b000 r4:84a1b000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a1b000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a2400 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a1b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa17000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514b38c r4:8514b000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8514b38c r4:8519f300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a1b000 r8:8519f32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f300 r8:8027ed34 r7:eaa09e60 r6:8519f380 r5:84a1b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9e1fb0 to 0xea9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a25c0 INFO: task kworker/0:297:4043 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c965e000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:298:4046 blocked for more than 468 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:298 state:D stack:0 pid:4046 tgid:4046 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa15d84 r8:00000002 r7:60000013 r6:eaa15d8c r5:84a1bc00 r4:84a1bc00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a1bc00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa15e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a2740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a1bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514bb8c r4:8514b800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8514bb8c r4:8519f400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a1bc00 r8:8519f42c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f400 r8:8027ed34 r7:eaa09e60 r6:8519f480 r5:84a1bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa15fb0 to 0xeaa15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a2600 INFO: task kworker/0:298:4046 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: c9b53000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:299:4048 blocked for more than 468 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:299 state:D stack:0 pid:4048 tgid:4048 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa35d84 r8:00000002 r7:60000113 r6:eaa35d8c r5:84a1c800 r4:84a1c800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a1c800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa35e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a2a80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a1c800 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ab000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515438c r4:85154000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515438c r4:8519f500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a1c800 r8:8519f52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f500 r8:8027ed34 r7:eaa15e60 r6:8519f580 r5:84a1c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa35fb0 to 0xeaa35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a26c0 INFO: task kworker/0:299:4048 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ca16a000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:300:4049 blocked for more than 468 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:300 state:D stack:0 pid:4049 tgid:4049 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa21d84 r8:00000002 r7:60000113 r6:eaa21d8c r5:84a1d400 r4:84a1d400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a1d400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa21e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a28c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a1d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa31000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514bf8c r4:8514bc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8514bf8c r4:8519f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a1d400 r8:8519f62c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f600 r8:8027ed34 r7:eaa35e60 r6:8519f680 r5:84a1d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa21fb0 to 0xeaa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a26c0 INFO: task kworker/0:300:4049 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ca16a000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:301:4052 blocked for more than 469 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:301 state:D stack:0 pid:4052 tgid:4052 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e47c1d84 r8:00000002 r7:60000113 r6:e47c1d8c r5:84a1e000 r4:84a1e000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a1e000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47c1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a2c00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a1e000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb1b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515478c r4:85154400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515478c r4:8519f700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a1e000 r8:8519f72c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f700 r8:8027ed34 r7:eaa35e60 r6:8519f780 r5:84a1e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47c1fb0 to 0xe47c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a2bc0 INFO: task kworker/0:301:4052 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: cb1d1000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:302:4054 blocked for more than 469 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:302 state:D stack:0 pid:4054 tgid:4054 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:e47f1d84 r8:00000002 r7:60000013 r6:e47f1d8c r5:84a1ec00 r4:84a1ec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a1ec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e47f1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a2d80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a1ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb9f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85154b8c r4:85154800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85154b8c r4:8519f800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a1ec00 r8:8519f82c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f800 r8:8027ed34 r7:e47c1e60 r6:8519f880 r5:84a1ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe47f1fb0 to 0xe47f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a2b40 INFO: task kworker/0:302:4054 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: cb1d2000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:303:4056 blocked for more than 469 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:303 state:D stack:0 pid:4056 tgid:4056 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea891d84 r8:00000002 r7:60000113 r6:ea891d8c r5:84720000 r4:84720000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84720000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea891e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a2f00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84720000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbfd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85154f8c r4:85154c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85154f8c r4:8519f900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84720000 r8:8519f92c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f900 r8:8027ed34 r7:e47f1e60 r6:8519f980 r5:84720000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea891fb0 to 0xea891ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a2cc0 INFO: task kworker/0:303:4056 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: cbdbd000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:304:4058 blocked for more than 469 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:304 state:D stack:0 pid:4058 tgid:4058 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa45d84 r8:00000002 r7:60000013 r6:eaa45d8c r5:851eb000 r4:851eb000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851eb000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa45e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522d2c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:851eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0023000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515578c r4:85155400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515578c r4:8519fa00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851eb000 r8:8519fa2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519fa00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519fa00 r8:8027ed34 r7:ea891e60 r6:85176880 r5:851eb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa45fb0 to 0xeaa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a2e40 INFO: task kworker/0:304:4058 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: cc33b000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:305:4060 blocked for more than 469 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:305 state:D stack:0 pid:4060 tgid:4060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa4dd84 r8:00000002 r7:60000113 r6:eaa4dd8c r5:851ed400 r4:851ed400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851ed400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa4de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522d040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:851ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515538c r4:85155000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515538c r4:8519fa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ed400 r8:8519faac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519fa80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519fa80 r8:8027ed34 r7:eaa45e60 r6:85176900 r5:851ed400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa4dfb0 to 0xeaa4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8522d100 INFO: task kworker/0:305:4060 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: cc7af000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:306:4061 blocked for more than 469 seconds. Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa51e08 r4:00000000 [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522d3c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:851ee000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0055000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85155b8c r4:85155800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85155b8c r4:8519fb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ee000 r8:8519fb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519fb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519fb00 r8:8027ed34 r7:eaa45e60 r6:85176980 r5:851ee000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa51fb0 to 0xeaa51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8522d100 INFO: task kworker/0:306:4061 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ccf6e000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa49e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85233540 r5:850e9f8c r4:850e9c00 r10:61c88647 r9:851eec00 r8:85176a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85176a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85176a00 r8:8027ed34 r7:e8815e60 r6:85176a80 r5:851eec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa49fb0 to 0xeaa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85233000 INFO: task kworker/1:168:4064 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: cd03b000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:307:4067 blocked for more than 469 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:307 state:D stack:0 pid:4067 tgid:4067 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa3dd84 r8:00000002 r7:60000113 r6:eaa3dd8c r5:851ec800 r4:851ec800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851ec800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa3de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522d480 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8519fb80 r8:8027ed34 r7:eaa51e60 r6:85176b00 r5:851ec800 r4:8522d340 Call trace: 5d20: cdc4a000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:308:4069 blocked for more than 469 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:308 state:D stack:0 pid:4069 tgid:4069 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa55d84 r8:00000002 r7:60000113 r6:eaa55d8c r5:85124800 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa55e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522d5c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85124800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515638c r4:85156000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515638c r4:8519fc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85124800 r8:8519fc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519fc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519fc00 r8:8027ed34 r7:eaa3de60 r6:85176b80 r5:85124800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa55fb0 to 0xeaa55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8522d4c0 INFO: task kworker/0:308:4069 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: cdc4b000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:309:4071 blocked for more than 469 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:309 state:D stack:0 pid:4071 tgid:4071 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85156f8c r4:8519fc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85116c00 r8:8519fcac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519fc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519fc80 r8:8027ed34 r7:eaa55e60 r6:85176c00 r5:85116c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa59fb0 to 0xeaa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8522d600 INFO: task kworker/0:309:4071 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:84b85b00 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa61e08 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522d700 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:851f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00e1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515678c r4:85156400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515678c r4:8519fd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851f0000 r8:8519fd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519fd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519fd00 r8:8027ed34 r7:eaa59e60 r6:85176c80 r5:851f0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa61fb0 to 0xeaa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8522d780 INFO: task kworker/0:310:4073 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa5dfb0 to 0xeaa5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8522d740 INFO: task kworker/0:311:4074 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ce671000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:169:4076 blocked for more than 469 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:169 state:D stack:0 pid:4076 tgid:4076 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa65d84 r8:00000002 r7:60000113 r6:eaa65d8c r5:851f1800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa65e08 r4:00000000 [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:85159f8c r4:85176d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851f1800 r8:85176dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85176d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85176d80 r8:8027ed34 r7:e8815e60 r6:85176e00 r5:851f1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa65fb0 to 0xeaa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85233500 INFO: task kworker/1:169:4076 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ced91000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84be0e00 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:312:4079 blocked for more than 469 seconds. Call trace: r10:829185c4 r9:eaa6dd84 r8:00000002 r7:60000013 r6:eaa6dd8c r5:851f3000 r5:851f3000 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa6de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522db40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:851f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0477000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515738c r4:85157000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515738c r4:8519fe00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851f3000 r8:8519fe2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519fe00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519fe00 r8:8027ed34 r7:eaa59e60 r6:85176e80 r5:851f3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa6dfb0 to 0xeaa6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8522d9c0 INFO: task kworker/0:312:4079 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: cf176000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:313:4081 blocked for more than 469 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:313 state:D stack:0 pid:4081 tgid:4081 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa75d84 r8:00000002 r7:60000113 r6:eaa75d8c r5:851f2400 r4:851f2400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851f2400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa75e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522dc00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:851f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0493000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515778c r4:85157400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515778c r4:8519fe80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851f2400 r8:8519feac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519fe80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519fe80 r8:8027ed34 r7:eaa6de60 r6:85176f00 r5:851f2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa75fb0 to 0xeaa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8522dac0 INFO: task kworker/0:313:4081 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: cfc23000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:314:4083 blocked for more than 470 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:314 state:D stack:0 pid:4083 tgid:4083 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa7dd84 r8:00000002 r7:60000113 r6:eaa7dd8c r5:851f3c00 r4:851f3c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851f3c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa7de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a5880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:851f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04f3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515ab8c r4:8515a800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515ab8c r4:8519ff00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851f3c00 r8:8519ff2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519ff00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519ff00 r8:8027ed34 r7:eaa75e60 r6:85176f80 r5:851f3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa7dfb0 to 0xeaa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8522dc40 INFO: task kworker/0:314:4083 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: cfc73000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:315:4084 blocked for more than 470 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:315 state:D stack:0 pid:4084 tgid:4084 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa81d84 r8:00000002 r7:60000113 r6:eaa81d8c r5:851f5400 r4:851f5400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851f5400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa81e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522dd40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:851f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04af000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85157b8c r4:85157800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85157b8c r4:8519ff80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851f5400 r8:8519ffac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519ff80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519ff80 r8:8027ed34 r7:eaa7de60 r6:85237000 r5:851f5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa81fb0 to 0xeaa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8522dc40 INFO: task kworker/0:315:4084 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: cfdbb000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:316:4086 blocked for more than 470 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:316 state:D stack:0 pid:4086 tgid:4086 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa85d84 r8:00000002 r7:60000113 r6:eaa85d8c r5:851f6000 r4:851f6000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851f6000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa85e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522dfc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:851f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e056b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85157f8c r4:85157c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85157f8c r4:85232000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851f6000 r8:8523202c r7:82804d40 r6:dddced40 r5:dddced60 r4:85232000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85232000 r8:8027ed34 r7:eaa7de60 r6:85237080 r5:851f6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa85fb0 to 0xeaa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8522dd80 INFO: task kworker/0:316:4086 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d0429000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:317:4088 blocked for more than 470 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:317 state:D stack:0 pid:4088 tgid:4088 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa8dd84 r8:00000002 r7:60000113 r6:eaa8dd8c r5:851f4800 r4:851f4800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851f4800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa8de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852300c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:851f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e058f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515838c r4:85158000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515838c r4:85232080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851f4800 r8:852320ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85232080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85232080 r8:8027ed34 r7:eaa7de60 r6:85237100 r5:851f4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa8dfb0 to 0xeaa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85230040 INFO: task kworker/0:317:4088 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d09f9000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:318:4090 blocked for more than 470 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:318 state:D stack:0 pid:4090 tgid:4090 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa95d84 r8:00000002 r7:60000113 r6:eaa95d8c r5:851f8c00 r4:851f8c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851f8c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa95e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85230200 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:851f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05af000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515878c r4:85158400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515878c r4:85232100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851f8c00 r8:8523212c r7:82804d40 r6:dddced40 r5:dddced60 r4:85232100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85232100 r8:8027ed34 r7:eaa7de60 r6:85237180 r5:851f8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa95fb0 to 0xeaa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85230040 INFO: task kworker/0:318:4090 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d0d3c000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:319:4092 blocked for more than 470 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:319 state:D stack:0 pid:4092 tgid:4092 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa9de08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:851f8000 r8:852321ac r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 5d20: d1023000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 r4:dffd5dc0 r4:00000000 r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:320:4095 blocked for more than 470 seconds. r10:829185c4 r9:eaaa9d84 r8:00000002 r7:60000113 r6:eaaa9d8c r5:851f9800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa9e08 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018005 r8:851f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85158f8c r4:85232200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851f9800 r8:8523222c r7:82804d40 r6:dddced40 r5:dddced60 r4:85232200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85232200 r8:8027ed34 r7:eaa7de60 r6:85237280 r5:851f9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa9fb0 to 0xeaaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85230280 INFO: task kworker/0:320:4095 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d10d5000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r4:82abf1e4 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515938c r4:85232280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851fa400 r8:852322ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85232280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85232280 r8:8027ed34 r7:eaa7de60 r6:85237300 r5:851fa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaadfb0 to 0xeaaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85230400 INFO: task kworker/0:321:4096 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d15c1000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:322:4098 blocked for more than 470 seconds. [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:e064d000 r10:61c88647 r9:851fbc00 r8:8523232c r7:82804d40 r6:dddced40 r5:dddced60 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d17ab000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:323:4101 blocked for more than 470 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:323 state:D stack:0 pid:4101 tgid:4101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaab5d84 r8:00000002 r7:60000013 r6:eaab5d8c r5:851fc800 r4:851fc800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab5e08 r4:00000000 [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:e47f3000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d1e54000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/0:324:4104 blocked for more than 470 seconds. r4:851fd400 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa79e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85230b80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:851fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8823000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515a38c r4:8515a000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515a38c r4:85232480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851fd400 r8:852324ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85232480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85232480 r8:8027ed34 r7:eaa7de60 r6:85237480 r5:851fd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa79fb0 to 0xeaa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852306c0 INFO: task kworker/0:324:4104 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d1e54000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 r4:851fe000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243480 r5:850eab8c r4:850ea800 r10:00000000 r9:85237500 r8:8027ed34 r7:e8815e60 r6:85237580 r5:851fe000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d20: d220a000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:84b85b00 task:kworker/1:171 state:D stack:0 pid:4107 tgid:4107 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab9e08 r4:00000000 r4:00000001 Exception stack(0xeaab9fb0 to 0xeaab9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffd5d20 to 0xdffd5d68) 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:325:4108 blocked for more than 470 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:325 state:D stack:0 pid:4108 tgid:4108 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa69d84 r8:00000002 r7:60000113 r6:eaa69d8c r5:851fb000 r4:851fb000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851fb000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa69e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d2db3000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 r5:851f6c00 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaabde08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8867000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850eaf8c r4:850eac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850eaf8c r4:85237780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851f6c00 r8:852377ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85237780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85237780 r8:8027ed34 r7:eaaa5e60 r6:85237800 r5:851f6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaabdfb0 to 0xeaabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852434c0 INFO: task kworker/1:172:4110 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d36ca000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:173:4112 blocked for more than 470 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:173 state:D stack:0 pid:4112 tgid:4112 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaac1d84 r8:00000002 r7:60000113 r6:eaac1d8c r5:84a38000 r4:84a38000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a38000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243800 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a38000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8875000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850eb38c r4:850eb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850eb38c r4:85237880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a38000 r8:852378ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85237880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85237880 r8:8027ed34 r7:eaabde60 r6:85237900 r5:84a38000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac1fb0 to 0xeaac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852435c0 INFO: task kworker/1:173:4112 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d3d5b000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:174:4115 blocked for more than 470 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:174 state:D stack:0 pid:4115 tgid:4115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaac5d84 r8:00000002 r7:60000113 r6:eaac5d8c r5:84a38c00 r4:84a38c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a38c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac5e08 INFO: task kworker/0:326:4117 blocked for more than 470 seconds. r5:84a39800 r4:829185c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a39800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0539000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515af8c r4:8515ac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515af8c r4:85232580 r10:61c88647 r9:84a39800 r8:852325ac r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: d43c9000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84bb0b8c r4:84bb0800 r4:84be0e00 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:175:4120 blocked for more than 470 seconds. task:kworker/1:175 state:D stack:0 pid:4120 tgid:4120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaac9d84 r8:00000002 r7:60000013 r6:eaac9d8c r5:84a3a400 r4:84a3a400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3a400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243d00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a3a400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaa9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ebf8c r4:850ebc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ebf8c r4:85237b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3a400 r8:85237b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85237b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85237b00 r8:8027ed34 r7:eaac5e60 r6:85237b80 r5:84a3a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac9fb0 to 0xeaac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85243ac0 INFO: task kworker/1:175:4120 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 Exception stack(0xdffd5d20 to 0xdffd5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r5:00001000 r4:dfea3000 r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:176 state:D stack:0 pid:4122 tgid:4122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea9f9d84 r8:00000002 r7:60000113 r6:ea9f9d8c r5:84a3b000 r4:84a3b000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3b000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243dc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a3b000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd33000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8493778c r4:84937400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8493778c r4:85237c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3b000 r8:85237c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85237c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85237c00 r8:8027ed34 r7:eaac9e60 r6:85237c80 r5:84a3b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f9fb0 to 0xea9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85243cc0 INFO: task kworker/1:176:4122 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d6471000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:177:4124 blocked for more than 471 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:177 state:D stack:0 pid:4124 tgid:4124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaad5d84 r8:00000002 r7:60000013 r6:eaad5d8c r5:84723c00 r4:84723c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84723c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:e0691000 r7:ddde2d40 r6:83018200 r5:851c1b8c r4:85237d00 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:80070113 r4:80239bd0 r4:00000000 r5:00001000 r4:dfea3000 r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:178:4125 blocked for more than 471 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:178 state:D stack:0 pid:4125 tgid:4125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaad9d84 r8:00000002 r7:60000113 r6:eaad9d8c r5:84723000 r4:84723000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84723000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84761900 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84723000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84937b8c r4:84937800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84723000 r8:85237dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xeaad9fb0 to 0xeaad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85243fc0 INFO: task kworker/1:178:4125 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d6a47000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:179:4127 blocked for more than 471 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:179 state:D stack:0 pid:4127 tgid:4127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaae9d84 r8:00000002 r7:60000013 r6:eaae9d8c r5:84724800 r4:84724800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae9e08 [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85237e00 r8:8027ed34 r7:eaad5e60 r6:85232700 r5:84724800 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85227100 INFO: task kworker/1:179:4127 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d6f8a000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85227180 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84725400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe7d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c038c r4:851c0000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c038c r4:85237e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84725400 r8:85237eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85237e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85237e80 r8:8027ed34 r7:eaad5e60 r6:85232780 r5:84725400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaf1fb0 to 0xeaaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:82abf1e4 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:181:4131 blocked for more than 471 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:181 state:D stack:0 pid:4131 tgid:4131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaaf9d84 r8:00000002 r7:60000113 r6:eaaf9d8c r5:84720c00 r4:84720c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84720c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d752f000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:182:4133 blocked for more than 471 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:182 state:D stack:0 pid:4133 tgid:4133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab01d84 r8:00000002 r7:60000113 r6:eab01d8c r5:84726c00 r4:84726c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84726c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab01e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852273c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84726c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff11000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c0b8c r4:851c0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c0b8c r4:85237f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84726c00 r8:85237fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85237f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85237f80 r8:8027ed34 r7:eaad5e60 r6:85232880 r5:84726c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab01fb0 to 0xeab01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85227240 INFO: task kworker/1:182:4133 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d878b000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:183:4135 blocked for more than 471 seconds. r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:184:4136 blocked for more than 471 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:184 state:D stack:0 pid:4136 tgid:4136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab11d84 r8:00000002 r7:60000013 r6:eab11d8c r5:84722400 r4:84722400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84722400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab11e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85227880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84722400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e065d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c138c r4:851c1000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c138c r4:851e5080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84722400 r8:851e50ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5080 r8:8027ed34 r7:eaad5e60 r6:85232980 r5:84722400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab11fb0 to 0xeab11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85227500 INFO: task kworker/1:184:4136 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d8fab000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:327:4139 blocked for more than 471 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:327 state:D stack:0 pid:4139 tgid:4139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab0dd84 r8:00000002 r7:60000113 r6:eab0dd8c r5:84721800 r4:84721800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84721800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab0de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a5b00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84721800 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0559000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515b38c r4:8515b000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515b38c r4:85232a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84721800 r8:85232a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85232a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85232a00 r8:8027ed34 r7:eaacde60 r6:85232a80 r5:84721800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab0dfb0 to 0xeab0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a5900 INFO: task kworker/0:327:4139 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d9500000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:328:4141 blocked for more than 471 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:328 state:D stack:0 pid:4141 tgid:4141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ea9a1d84 r8:00000002 r7:60000113 r6:ea9a1d8c r5:8512ec00 r4:8512ec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8512ec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519e200 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8512ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea971000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526038c r4:85260000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8526038c r4:85232b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8512ec00 r8:85232b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85232b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85232b00 r8:8027ed34 r7:eab0de60 r6:85232b80 r5:8512ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9a1fb0 to 0xea9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a5a40 INFO: task kworker/0:328:4141 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: d9a48000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:329:4143 blocked for more than 471 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:329 state:D stack:0 pid:4143 tgid:4143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaa25d84 r8:00000002 r7:60000113 r6:eaa25d8c r5:84a28000 r4:84a28000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a28000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa25e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a5e00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a28000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06a7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515b78c r4:8515b400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515b78c r4:85232c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a28000 r8:85232c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85232c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85232c00 r8:8027ed34 r7:ea9a1e60 r6:85232c80 r5:84a28000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa25fb0 to 0xeaa25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a5a40 INFO: task kworker/0:329:4143 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: daf74000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:185:4146 blocked for more than 471 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:185 state:D stack:0 pid:4146 tgid:4146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab21d84 r8:00000002 r7:60000113 r6:eab21d8c r5:84a2a400 r4:84a2a400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2a400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab21e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85227900 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a2a400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e066f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c178c r4:851c1400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c178c r4:851e5100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2a400 r8:851e512c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5100 r8:8027ed34 r7:eaad5e60 r6:85232d00 r5:84a2a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab21fb0 to 0xeab21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85227840 INFO: task kworker/1:185:4146 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: dafdc000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:186:4147 blocked for more than 471 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:186 state:D stack:0 pid:4147 tgid:4147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab25d84 r8:00000002 r7:60000113 r6:eab25d8c r5:84a28c00 r4:84a28c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a28c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab25e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85227e80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a28c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0739000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c278c r4:851c2400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c278c r4:851e5180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a28c00 r8:851e51ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5180 r8:8027ed34 r7:eaad5e60 r6:85232d80 r5:84a28c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab25fb0 to 0xeab25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85227bc0 INFO: task kworker/1:186:4147 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: db4b7000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:187:4150 blocked for more than 471 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:187 state:D stack:0 pid:4150 tgid:4150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab19d84 r8:00000002 r7:60000113 r6:eab19d8c r5:84a3c800 r4:84a3c800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3c800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab19e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85227d00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a3c800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06f9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c1f8c r4:851c1c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c1f8c r4:851e5200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3c800 r8:851e522c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5200 r8:8027ed34 r7:eab25e60 r6:851e5280 r5:84a3c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab19fb0 to 0xeab19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85227b80 INFO: task kworker/1:187:4150 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: db94a000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 r4:82abf1e4 r4:00000000 r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:188:4153 blocked for more than 471 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:188 state:D stack:0 pid:4153 tgid:4153 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab2dd84 r8:00000002 r7:60000113 r6:eab2dd8c r5:84a2b000 r4:84a2b000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2b000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab2de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85227d80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a2b000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e070d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeab2dfb0 to 0xeab2dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:189:4155 blocked for more than 471 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:189 state:D stack:0 pid:4155 tgid:4155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab35d84 r8:00000002 r7:60000013 r6:eab35d8c r5:84a2d400 r4:84a2d400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2d400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab35e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519b3c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a2d400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8c1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c3f8c r4:851c3c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c3f8c r4:851e5380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2d400 r8:851e53ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85227b40 INFO: task kworker/1:189:4155 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: dc113000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:190:4156 blocked for more than 471 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:190 state:D stack:0 pid:4156 tgid:4156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab39d84 r8:00000002 r7:60000013 r6:eab39d8c r5:84a2e000 r4:84a2e000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2e000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab39e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a5700 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a2e000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0771000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeab39fb0 to 0xeab39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85227ec0 INFO: task kworker/1:190:4156 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: dc115000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:330:4158 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:330 state:D stack:0 pid:4158 tgid:4158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab41d84 r8:00000002 r7:60000113 r6:eab41d8c r5:84a2ec00 r4:84a2ec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2ec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab41e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519e980 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8f3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515bb8c r4:8515b800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515bb8c r4:85232f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2ec00 r8:85232fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85232f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85232f80 r8:8027ed34 r7:ea9a1e60 r6:85232400 r5:84a2ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab41fb0 to 0xeab41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84761640 INFO: task kworker/0:330:4158 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: dcf74000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:191:4159 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:191 state:D stack:0 pid:4159 tgid:4159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab45d84 r8:00000002 r7:60000113 r6:eab45d8c r5:84a2c800 r4:84a2c800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2c800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab45e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522dc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a2c800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47b1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c2f8c r4:851c2c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c2f8c r4:851e5480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2c800 r8:851e54ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5480 r8:8027ed34 r7:eab35e60 r6:85198000 r5:84a2c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab45fb0 to 0xeab45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8522df80 INFO: task kworker/1:191:4159 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: dd1c7000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:192:4161 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:192 state:D stack:0 pid:4161 tgid:4161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab4dd84 r8:00000002 r7:60000013 r6:eab4dd8c r5:84a2bc00 r4:84a2bc00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2bc00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab4de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519b000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a2bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47fd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c338c r4:851c3000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c338c r4:851e5500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2bc00 r8:851e552c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5500 r8:8027ed34 r7:eab35e60 r6:85198080 r5:84a2bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab4dfb0 to 0xeab4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519b040 INFO: task kworker/1:192:4161 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: dd32e000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:193:4163 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:193 state:D stack:0 pid:4163 tgid:4163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab55d84 r8:00000002 r7:60000113 r6:eab55d8c r5:844d0c00 r4:844d0c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844d0c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab55e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519b180 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea881000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c378c r4:851c3400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c378c r4:851e5580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d0c00 r8:851e55ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5580 r8:8027ed34 r7:eab35e60 r6:85198100 r5:844d0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab55fb0 to 0xeab55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519b1c0 INFO: task kworker/1:193:4163 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: dd6a8000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:194:4165 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:194 state:D stack:0 pid:4165 tgid:4165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab5dd84 r8:00000002 r7:60000013 r6:eab5dd8c r5:844d0000 r4:844d0000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844d0000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab5de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519b300 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844d0000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8b1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c3b8c r4:851c3800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c3b8c r4:851e5600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d0000 r8:851e562c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5600 r8:8027ed34 r7:eab35e60 r6:85198180 r5:844d0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab5dfb0 to 0xeab5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519b140 INFO: task kworker/1:194:4165 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: dd6a8000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:844d1800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab65e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c4b8c r4:851e5680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d1800 r8:851e56ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5680 r8:8027ed34 r7:eab35e60 r6:85198200 r5:844d1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab65fb0 to 0xeab65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519b240 r4:dffd5dc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea913000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c438c r4:851c4000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c438c r4:851e5700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d3000 r8:851e572c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:851e5700 r8:8027ed34 r7:eab65e60 r6:85198280 r5:844d3000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: Exception stack(0xdffd5d20 to 0xdffd5d68) r4:dffd5dc0 r4:00000000 r5:84bb0b8c r4:84bb0800 r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:84b85b00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab1de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519ea80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:844d3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea905000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515bf8c r4:8515bc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8515bf8c r4:85198300 r10:61c88647 r9:844d3c00 r8:8519832c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:85198300 r8:8027ed34 r7:ea9a1e60 r6:85198380 r5:844d3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab1dfb0 to 0xeab1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519ea00 INFO: task kworker/0:331:4172 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: de954000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:332:4173 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:332 state:D stack:0 pid:4173 tgid:4173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab61d84 r8:00000002 r7:60000113 r6:eab61d8c r5:844d4800 r4:844d4800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844d4800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab61e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85260f8c r4:85198400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d4800 r8:8519842c r7:82804d40 r6:dddced40 r5:dddced60 r4:85198400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85198400 r8:8027ed34 r7:ea9a1e60 r6:85198480 r5:844d4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab61fb0 to 0xeab61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519ea00 INFO: task kworker/0:332:4173 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: dede6000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:197:4175 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:197 state:D stack:0 pid:4175 tgid:4175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab71d84 r8:00000002 r7:60000113 r6:eab71d8c r5:844d6000 r4:844d6000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844d6000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab71e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519b740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844d6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea921000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c478c r4:851c4400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c478c r4:851e5780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d6000 r8:851e57ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5780 r8:8027ed34 r7:eab65e60 r6:85198500 r5:844d6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab71fb0 to 0xeab71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519b640 INFO: task kworker/1:197:4175 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: df02e000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:198:4178 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:198 state:D stack:0 pid:4178 tgid:4178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab7dd84 r8:00000002 r7:60000113 r6:eab7dd8c r5:844d2400 r4:844d2400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844d2400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab7de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519bd00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9a3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c578c r4:851c5400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c578c r4:851e5800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d2400 r8:851e582c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5800 r8:8027ed34 r7:eab65e60 r6:85198580 r5:844d2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519b900 INFO: task kworker/1:198:4178 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: df14c000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:199:4179 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:199 state:D stack:0 pid:4179 tgid:4179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab81d84 r8:00000002 r7:60000113 r6:eab81d8c r5:844d6c00 r4:844d6c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844d6c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab81e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519b940 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea939000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c4f8c r4:851c4c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c4f8c r4:851e5880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d6c00 r8:851e58ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5880 r8:8027ed34 r7:eab7de60 r6:85198600 r5:844d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab81fb0 to 0xeab81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519ba80 INFO: task kworker/1:199:4179 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: df67c000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:200:4181 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:200 state:D stack:0 pid:4181 tgid:4181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab89d84 r8:00000002 r7:60000113 r6:eab89d8c r5:844d5400 r4:844d5400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844d5400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab89e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519bac0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea95f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c538c r4:851c5000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c538c r4:851e5980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d5400 r8:851e59ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5980 r8:8027ed34 r7:eab7de60 r6:85198680 r5:844d5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab89fb0 to 0xeab89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519b980 INFO: task kworker/1:200:4181 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: e11af000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:333:4184 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:333 state:D stack:0 pid:4184 tgid:4184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab15d84 r8:00000002 r7:60000113 r6:eab15d8c r5:849b0000 r4:849b0000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b0000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab15e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518ad80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e882b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85260b8c r4:85260800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85260b8c r4:85198700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b0000 r8:8519872c r7:82804d40 r6:dddced40 r5:dddced60 r4:85198700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85198700 r8:8027ed34 r7:eab61e60 r6:85198780 r5:849b0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab15fb0 to 0xeab15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519e1c0 INFO: task kworker/0:333:4184 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: e213e000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:201:4186 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:201 state:D stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab8dd84 r8:00000002 r7:60000113 r6:eab8dd8c r5:849b0c00 r4:849b0c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b0c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab8de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519bdc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ed000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c5b8c r4:851c5800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c5b8c r4:851e5900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b0c00 r8:851e592c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5900 r8:8027ed34 r7:eab7de60 r6:85198800 r5:849b0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab8dfb0 to 0xeab8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519ba40 INFO: task kworker/1:201:4186 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: e2607000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:202:4187 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:202 state:D stack:0 pid:4187 tgid:4187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab91d84 r8:00000002 r7:60000113 r6:eab91d8c r5:849b1800 r4:849b1800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b1800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab91e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519bfc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb0f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c5f8c r4:851c5c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c5f8c r4:851e5a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b1800 r8:851e5a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5a00 r8:8027ed34 r7:eab8de60 r6:85198880 r5:849b1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab91fb0 to 0xeab91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519be00 INFO: task kworker/1:202:4187 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:203:4188 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:203 state:D stack:0 pid:4188 tgid:4188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab95d84 r8:00000002 r7:60000013 r6:eab95d8c r5:849b2400 r4:849b2400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b2400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab95e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85227780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:849b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbbf000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:204:4192 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:204 state:D stack:0 pid:4192 tgid:4192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaba1d84 r8:00000002 r7:60000013 r6:eaba1d8c r5:849b4800 r4:849b4800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b4800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:851e5b00 r8:8027ed34 r7:eab95e60 r6:85198980 r5:849b4800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:82abf1e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:205:4193 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:205 state:D stack:0 pid:4193 tgid:4193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab85d84 r8:00000002 r7:60000113 r6:eab85d8c r5:84a3ec00 r4:84a3ec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3ec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab85e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85194040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc59000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c678c r4:851c6400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c678c r4:851e5b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:851e5bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5b80 r8:8027ed34 r7:eaba1e60 r6:851e5c00 r5:84a3ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab85fb0 to 0xeab85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d20: e3d8c000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84be0e00 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab9de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85194280 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a3d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0019000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c6f8c r4:851c6c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a3d400 r8:851e5cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5c80 r8:8027ed34 r7:eaba1e60 r6:851e5d80 r5:84a3d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab9dfb0 to 0xeab9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Exception stack(0xdffd5d20 to 0xdffd5d68) [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:207:4197 blocked for more than 472 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:207 state:D stack:0 pid:4197 tgid:4197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab6dd84 r8:00000002 r7:60000113 r6:eab6dd8c r5:84a3bc00 r4:84a3bc00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3bc00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab6de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85194500 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a3bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c738c r4:851c7000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c738c r4:851e5d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3bc00 r8:851e5d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:208:4201 blocked for more than 473 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:208 state:D stack:0 pid:4201 tgid:4201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaba9d84 r8:00000002 r7:60000013 r6:eaba9d8c r5:84a3e000 r4:84a3e000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3e000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85194600 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00a9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c778c r4:851c7400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c778c r4:851e5e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:851e5eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e5e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e5e80 r8:8027ed34 r7:eab6de60 r6:851e5f00 r5:84a3e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba9fb0 to 0xeaba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85194440 INFO: task kworker/1:208:4201 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: e45a6000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:209:4202 blocked for more than 473 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:209 state:D stack:0 pid:4202 tgid:4202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb9e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:851c7b8c r4:851c7800 r4:851e5f80 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b85b00 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabb1d84 r8:00000002 r7:60000013 r6:eabb1d8c r5:84a29800 r4:84a29800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a29800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85194a80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a29800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e045f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cc38c r4:851cc000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851cc38c r4:85183000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a29800 r8:8518302c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183000 r8:8027ed34 r7:eabb9e60 r6:85183080 r5:84a29800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabb1fb0 to 0xeabb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85194780 INFO: task kworker/1:210:4205 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: e74bc000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:211:4206 blocked for more than 473 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:211 state:D stack:0 pid:4206 tgid:4206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabbdd84 r8:00000002 r7:60000113 r6:eabbdd8c r5:85200000 r4:85200000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85200000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabbde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851948c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85200000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0429000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c7f8c r4:851c7c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c7f8c r4:85183100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85200000 r8:8518312c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183100 r8:8027ed34 r7:eabb1e60 r6:85183180 r5:85200000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabbdfb0 to 0xeabbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85194780 INFO: task kworker/1:211:4206 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: e74f9000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:212:4208 blocked for more than 473 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:212 state:D stack:0 pid:4208 tgid:4208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabc1d84 r8:00000002 r7:60000113 r6:eabc1d8c r5:85200c00 r4:85200c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85200c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85194d40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85200c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04b1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ccb8c r4:851cc800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851ccb8c r4:85183200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85200c00 r8:8518322c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183200 r8:8027ed34 r7:eabb1e60 r6:85183280 r5:85200c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc1fb0 to 0xeabc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r5:80070113 r4:80239bd0 r4:dffd5dc0 r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85194b40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85201800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e048b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cc78c r4:851cc400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851cc78c r4:85183300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85201800 r8:8518332c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183300 r8:8027ed34 r7:eabc1e60 r6:85183380 r5:85201800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc5fb0 to 0xeabc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85194b80 INFO: task kworker/1:213:4210 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: e79d8000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:214:4211 blocked for more than 473 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:214 state:D stack:0 pid:4211 tgid:4211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabadd84 r8:00000002 r7:60000013 r6:eabadd8c r5:85203000 r4:85203000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85203000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabade08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85175040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85203000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05c5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cd38c r4:851cd000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851cd38c r4:85183400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85203000 r8:8518342c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183400 r8:8027ed34 r7:eabc1e60 r6:85183480 r5:85203000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabadfb0 to 0xeabadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85194b80 INFO: task kworker/1:214:4211 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: e7dac000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:215:4213 blocked for more than 473 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:215 state:D stack:0 pid:4213 tgid:4213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabcdd84 r8:00000002 r7:60000013 r6:eabcdd8c r5:85203c00 r4:85203c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85203c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabcde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85092cc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85203c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0583000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ccf8c r4:851ccc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851ccf8c r4:85183500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85203c00 r8:8518352c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183500 r8:8027ed34 r7:eabade60 r6:85183580 r5:85203c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabcdfb0 to 0xeabcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85194b80 INFO: task kworker/1:215:4213 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: e7edc000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:216:4216 blocked for more than 473 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:216 state:D stack:0 pid:4216 tgid:4216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabc9d84 r8:00000002 r7:60000013 r6:eabc9d8c r5:85204800 r4:85204800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85204800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85175140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85204800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0609000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cd78c r4:851cd400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851cd78c r4:85183600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85204800 r8:8518362c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183600 r8:8027ed34 r7:eabade60 r6:85183680 r5:85204800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc9fb0 to 0xeabc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85175280 INFO: task kworker/1:216:4216 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: e89c5000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:217:4218 blocked for more than 473 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:217 state:D stack:0 pid:4218 tgid:4218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabd5d84 r8:00000002 r7:60000013 r6:eabd5d8c r5:85205400 r4:85205400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85205400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85175300 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85205400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0643000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cdb8c r4:851cd800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851cdb8c r4:85183700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85205400 r8:8518372c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183700 r8:8027ed34 r7:eabc9e60 r6:85183780 r5:85205400 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85175100 INFO: task kworker/1:217:4218 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: e8f92000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:218:4220 blocked for more than 473 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85175540 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85206c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e065b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cdf8c r4:851cdc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851cdf8c r4:85183800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85206c00 r8:8518382c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183800 r8:8027ed34 r7:eabd5e60 r6:85183880 r5:85206c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd1fb0 to 0xeabd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851752c0 INFO: task kworker/1:218:4220 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: e8fbd000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:219:4221 blocked for more than 473 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:219 state:D stack:0 pid:4221 tgid:4221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabddd84 r8:00000002 r7:60000113 r6:eabddd8c r5:849b5400 r4:849b5400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b5400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabdde08 r4:00000000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85183900 r8:8027ed34 r7:eabd1e60 r6:85198a80 r5:849b5400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85175500 INFO: task kworker/1:219:4221 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ea19a000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:220:4223 blocked for more than 473 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:220 state:D stack:0 pid:4223 tgid:4223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabe1d84 r8:00000002 r7:60000113 r6:eabe1d8c r5:85206000 r4:85206000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85206000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe1e08 r4:00000000 [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ce78c r4:851ce400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851ce78c r4:85183980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85206000 r8:851839ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183980 r8:8027ed34 r7:eabdde60 r6:85183a00 r5:85206000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabe1fb0 to 0xeabe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85175100 INFO: task kworker/1:220:4223 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ec5c5000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:334:4227 blocked for more than 473 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:334 state:D stack:0 pid:4227 tgid:4227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabd9d84 r8:00000002 r7:60000113 r6:eabd9d8c r5:849b6c00 r4:849b6c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b6c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851759c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ce38c r4:851ce000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851ce38c r4:85198b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b6c00 r8:85198b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85198b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85198b00 r8:8027ed34 r7:eab61e60 r6:85198b80 r5:849b6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd9fb0 to 0xeabd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518ae80 INFO: task kworker/0:334:4227 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: ed4cb000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:335:4228 blocked for more than 473 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:335 state:D stack:0 pid:4228 tgid:4228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabe5d84 r8:00000002 r7:60000013 r6:eabe5d8c r5:849b6000 r4:849b6000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b6000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516aa00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa3f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85261b8c r4:85261800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85261b8c r4:85198c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b6000 r8:85198c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85198c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85198c00 r8:8027ed34 r7:eabd9e60 r6:85198c80 r5:849b6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabe5fb0 to 0xeabe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518ae80 INFO: task kworker/0:335:4228 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: eda24000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b85880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bb0b8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:336:4230 blocked for more than 473 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:336 state:D stack:0 pid:4230 tgid:4230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabedd84 r8:00000002 r7:60000113 r6:eabedd8c r5:849b3c00 r4:849b3c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b3c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabede08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516a780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa27000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526138c r4:85261000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8526138c r4:85198d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b3c00 r8:85198d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85198d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85198d00 r8:8027ed34 r7:eabe5e60 r6:85198d80 r5:849b3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabedfb0 to 0xeabedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518ae80 INFO: task kworker/0:336:4230 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: edd12000 edd7b000 00000001 80239bb8 7f46d000 00000001 82abf1c4 82abe5a0 5d40: 7f46d000 edd7b000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:829185c4 r9:eabf9d84 r8:00000002 r7:60000113 r6:eabf9d8c r5:84728c00 [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85175c80 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85175dc0 INFO: task kworker/1:221:4232 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 7f87f000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 90070113 ffffffff r5:90070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:222:4235 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:222 state:D stack:0 pid:4235 tgid:4235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac05d84 r8:00000002 r7:60000013 r6:eac05d8c r5:8472a400 r4:8472a400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cf38c r4:851cf000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851cf38c r4:85183a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8472a400 r8:85183aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183a80 r8:8027ed34 r7:eabf9e60 r6:85198e80 r5:8472a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac05fb0 to 0xeac05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85175d40 INFO: task kworker/1:222:4235 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 7f87f000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 90070113 ffffffff r5:90070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:223:4236 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:223 state:D stack:0 pid:4236 tgid:4236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac09d84 r8:00000002 r7:60000113 r6:eac09d8c r5:8472b000 r4:8472b000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8472b000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac09e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b78c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8472b000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d938c r4:851d9000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851d938c r4:85183b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8472b000 r8:85183bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183b80 r8:8027ed34 r7:eac05e60 r6:85198f00 r5:8472b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac09fb0 to 0xeac09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85175d40 INFO: task kworker/1:223:4236 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 81758000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 r4:82abf1e4 r4:dffd5dc0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:224:4238 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:224 state:D stack:0 pid:4238 tgid:4238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac11d84 r8:00000002 r7:60000013 r6:eac11d8c r5:84728000 r4:84728000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84728000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac11e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:225:4240 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:225 state:D stack:0 pid:4240 tgid:4240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac19d84 r8:00000002 r7:60000113 r6:eac19d8c r5:84729800 r4:84729800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84729800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac19e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518a880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84729800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9e9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cfb8c r4:851cf800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851cfb8c r4:85183c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84729800 r8:85183cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183c80 r8:8027ed34 r7:eac09e60 r6:850af000 r5:84729800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac19fb0 to 0xeac19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518a2c0 INFO: task kworker/1:225:4240 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 82b9d000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84be0e00 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc2-syzkaller #0 r10:829185c4 r9:eac21d84 r8:00000002 r7:60000113 r6:eac21d8c r5:8472bc00 [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac21e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b7040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:82abf1e4 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:227:4244 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:227 state:D stack:0 pid:4244 tgid:4244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:8472c800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8472c800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac29e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b71c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8472c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa01000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d838c r4:851d8000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851d838c r4:85183d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8472c800 r8:85183dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183d80 r8:8027ed34 r7:eac09e60 r6:850af100 r5:8472c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac29fb0 to 0xeac29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850b7140 INFO: task kworker/1:227:4244 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 830d3000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:228:4246 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829185c4 r9:eac31d84 r8:00000002 r7:60000113 r6:eac31d8c r5:8472ec00 [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b72c0 [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac35e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b7740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8472d400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd4b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d8b8c r4:851d8800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851d8b8c r4:85183e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8472d400 r8:85183eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85183e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85183e80 r8:8027ed34 r7:eac09e60 r6:850af200 r5:8472d400 task:kworker/0:337 state:D stack:0 pid:4250 tgid:4250 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeabf1fb0 to 0xeabf1ff8) r4:8516a740 Workqueue: events bpf_prog_free_deferred r4:82abf1e4 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:338:4252 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:338 state:D stack:0 pid:4252 tgid:4252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac2dd84 r8:00000002 r7:60000113 r6:eac2dd8c r5:84a08000 r4:84a08000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a08000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac2de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82abf1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 5fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8520a400 [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab59e08 [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:8520a400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 r7:ddde2d40 r6:83018200 r5:851d8f8c r4:85183f00 r10:00000000 r9:85183f00 r8:8027ed34 r7:eac09e60 r6:85183f80 r5:8520a400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:339:4259 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:339 state:D stack:0 pid:4259 tgid:4259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac39d84 r8:00000002 r7:60000113 r6:eac39d8c r5:85209800 r4:85209800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85209800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac39e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508e640 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85209800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea983000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85262b8c r4:85262800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85262b8c r4:850af480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85209800 r8:850af4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:850af480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850af480 r8:8027ed34 r7:eac2de60 r6:850b1000 r5:85209800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac39fb0 to 0xeac39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8516ad40 INFO: task kworker/0:339:4259 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 851e0000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:340:4260 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:340 state:D stack:0 pid:4260 tgid:4260 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabf5d84 r8:00000002 r7:60000113 r6:eabf5d8c r5:8520b000 r4:8520b000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8520b000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508e540 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8520b000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea941000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526278c r4:85262400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8526278c r4:850af500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8520b000 r8:850af52c r7:82804d40 r6:dddced40 r5:dddced60 r4:850af500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850af500 r8:8027ed34 r7:eac39e60 r6:850b1080 r5:8520b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabf5fb0 to 0xeabf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8516ad40 INFO: task kworker/0:340:4260 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 851e0000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:231:4262 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:231 state:D stack:0 pid:4262 tgid:4262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac3dd84 r8:00000002 r7:60000113 r6:eac3dd8c r5:8520bc00 r4:8520bc00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8520bc00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac3de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b7d00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8520bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04cf000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851d9b8c r4:851d9800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851d9b8c r4:850b1100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8520bc00 r8:850b112c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850b1100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b1100 r8:8027ed34 r7:eac09e60 r6:850b1180 r5:8520bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac3dfb0 to 0xeac3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850b7900 INFO: task kworker/1:231:4262 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:232 state:D stack:0 pid:4264 tgid:4264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eab75d84 r8:00000002 r7:60000013 r6:eab75d8c r5:8520c800 r4:8520c800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8520c800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab75e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b7c40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8520c800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 Exception stack(0xeac41fb0 to 0xeac41ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850b7e00 INFO: task kworker/1:233:4266 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 857b6000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r5:85e0df8c r4:85e0dc00 r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac45d84 r8:00000002 r7:60000113 r6:eac45d8c r5:8520e000 r4:8520e000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8520e000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac45e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b7540 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8520e000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05c1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851da38c r4:851da000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851da38c r4:850b1400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8520e000 r8:850b142c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850b1400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b1400 r8:8027ed34 r7:eac41e60 r6:850b1480 r5:8520e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac45fb0 to 0xeac45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850b7f00 INFO: task kworker/1:234:4268 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 85bd9000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829185c4 r9:eac49d84 r8:00000002 r7:60000113 r6:eac49d8c r5:8520ec00 r4:8520ec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8520ec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac49e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xeac49fb0 to 0xeac49ff8) r4:850b7f00 r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:82abf1e4 r4:dffd5dc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:236:4272 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:236 state:D stack:0 pid:4272 tgid:4272 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac4dd84 r8:00000002 r7:60000013 r6:eac4dd8c r5:85208000 r4:85208000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac4de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851757c0 r4:00000000 r5:00001000 r4:e0669000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:80070113 r4:80239bd0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:237:4274 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:237 state:D stack:0 pid:4274 tgid:4274 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:851dab8c r4:850b1700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85208c00 r8:850b172c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850b1700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b1700 r8:8027ed34 r7:eac49e60 r6:850b1780 r5:85208c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac51fb0 to 0xeac51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850a6280 INFO: task kworker/1:237:4274 is blocked on a mutex likely owned by task kworker/1:86:3549. [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:851daf8c r4:850b1800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85e0df8c r4:85e0dc00 r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:239:4278 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:239 state:D stack:0 pid:4278 tgid:4278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac59d84 r8:00000002 r7:60000013 r6:eac59d8c r5:85210000 r4:85210000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85210000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac59e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:85210000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:850b1900 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850a6340 INFO: task kworker/1:239:4278 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 87667000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:240:4280 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:240 state:D stack:0 pid:4280 tgid:4280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac5dd84 r8:00000002 r7:60000013 r6:eac5dd8c r5:85210c00 r4:85210c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85210c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac5de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a6600 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85210c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e47b7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851dbb8c r4:851db800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851dbb8c r4:850b1a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85210c00 r8:850b1a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850b1a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b1a00 r8:8027ed34 r7:eac49e60 r6:850b1a80 r5:85210c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac5dfb0 to 0xeac5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850a6400 INFO: task kworker/1:240:4280 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 87ee2000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:241:4282 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:241 state:D stack:0 pid:4282 tgid:4282 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac61d84 r8:00000002 r7:60000113 r6:eac61d8c r5:85211800 r4:85211800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r9:83018205 r8:85211800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 r4:850a6540 INFO: task kworker/1:241:4282 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 884f7000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:242:4283 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:242 state:D stack:0 pid:4283 tgid:4283 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac65d84 r8:00000002 r7:60000113 r6:eac65d8c r5:85212400 r4:85212400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85212400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac65e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a6780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85212400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 889e4000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:243:4287 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:243 state:D stack:0 pid:4287 tgid:4287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac69d84 r8:00000002 r7:60000113 r6:eac69d8c r5:85213000 r4:85213000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85213000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac69e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a6940 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85213000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8b7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529838c r4:85298000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8529838c r4:850b1d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85213000 r8:850b1d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850b1d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b1d00 r8:8027ed34 r7:eac61e60 r6:850b1d80 r5:85213000 r4:00000001 Exception stack(0xeac69fb0 to 0xeac69ff8) r4:850a6900 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 88b59000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:244:4288 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:244 state:D stack:0 pid:4288 tgid:4288 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac71d84 r8:00000002 r7:60000113 r6:eac71d8c r5:85213c00 r4:85213c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85213c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac71e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a6a00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85213c00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8ed000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529878c r4:85298400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8529878c r4:850b1e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85213c00 r8:850b1e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850b1e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b1e00 r8:8027ed34 r7:eac61e60 r6:850b1e80 r5:85213c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac71fb0 to 0xeac71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850a6d00 INFO: task kworker/1:244:4288 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 88d66000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:245:4289 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:245 state:D stack:0 pid:4289 tgid:4289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac79d84 r8:00000002 r7:60000113 r6:eac79d8c r5:85214800 r4:85214800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85214800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac79e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a6b40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85214800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea90b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85298b8c r4:85298800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85298b8c r4:850b1f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85214800 r8:850b1f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850b1f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b1f00 r8:8027ed34 r7:eac61e60 r6:850b1f80 r5:85214800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac79fb0 to 0xeac79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850a6d00 INFO: task kworker/1:245:4289 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 88e26000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:00001000 r4:ecb2b000 r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:246:4292 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:246 state:D stack:0 pid:4292 tgid:4292 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac75d84 r8:00000002 r7:60000113 r6:eac75d8c r5:85215400 r4:85215400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85215400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac75e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850a6e80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85215400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea91f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85298f8c r4:85298c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85298f8c r4:8508a000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85215400 r8:8508a02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8508a000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508a000 r8:8027ed34 r7:eac61e60 r6:8508a080 r5:85215400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac75fb0 to 0xeac75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850a6e40 INFO: task kworker/1:246:4292 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 892af000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 r5:00001000 r4:ecb2b000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:247 state:D stack:0 pid:4293 tgid:4293 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829185c4 r9:eac7dd84 r8:00000002 r7:60000013 r6:eac7dd8c r5:85216c00 r4:85216c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85216c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac7de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516af00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85216c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea931000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529938c r4:85299000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8529938c r4:8508a100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216c00 r8:8508a12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8508a100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508a100 r8:8027ed34 r7:eac61e60 r6:8508a180 r5:85216c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac7dfb0 to 0xeac7dff8) dfa0: 00000000 00000000 00000000 00000000 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r5:85218000 r4:829185c0 [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 INFO: task kworker/0:341:4297 blocked for more than 475 seconds. r4:85219800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85219800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac8de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84977bc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85219800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 r7:dddced40 r6:83018000 r5:848b678c r4:850af580 Exception stack(0xeac8dfb0 to 0xeac8dff8) task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 80070113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdffd5fb0 to 0xdffd5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:342:4300 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:342 state:D stack:0 pid:4300 tgid:4300 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac91d84 r8:00000002 r7:60000113 r6:eac91d8c r5:85218c00 r4:85218c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85218c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac91e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508e3c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85218c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85262f8c r4:85262c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85262f8c r4:850af600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85218c00 r8:850af62c r7:82804d40 r6:dddced40 r5:dddced60 r4:850af600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850af600 r8:8027ed34 r7:eac8de60 r6:8508a380 r5:85218c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac91fb0 to 0xeac91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508e740 INFO: task kworker/0:342:4300 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8a66e000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac81d84 r8:00000002 r7:60000113 r6:eac81d8c r5:8521b000 r4:8521b000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8521b000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac81e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85088540 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8521b000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa89000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeac81fb0 to 0xeac81ff8) 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:250:4303 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:250 state:D stack:0 pid:4303 tgid:4303 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac89d84 r8:00000002 r7:60000113 r6:eac89d8c r5:8521bc00 r4:8521bc00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8521bc00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac89e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850886c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8521bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa97000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85299f8c r4:85299c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85299f8c r4:8508a500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521bc00 r8:8508a52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8508a500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508a500 r8:8027ed34 r7:eac85e60 r6:8508a580 r5:8521bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac89fb0 to 0xeac89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85088800 INFO: task kworker/1:250:4303 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8a832000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:251:4306 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:251 state:D stack:0 pid:4306 tgid:4306 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac95d84 r8:00000002 r7:60000113 r6:eac95d8c r5:8521c800 r4:8521c800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8521c800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac95e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85088d00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8521c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaafb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529af8c r4:8529ac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8529af8c r4:8508a600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521c800 r8:8508a62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8508a600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508a600 r8:8027ed34 r7:eac85e60 r6:8508a680 r5:8521c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac95fb0 to 0xeac95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85088780 INFO: task kworker/1:251:4306 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8aab1000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:252:4308 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:252 state:D stack:0 pid:4308 tgid:4308 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac99d84 r8:00000002 r7:60000113 r6:eac99d8c r5:8521d400 r5:8521d400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac99e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850889c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8521d400 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaadf000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8508a700 r8:8027ed34 r7:eac95e60 r6:8508a780 r5:8521d400 r4:85088900 r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829185c4 r9:eaca1d84 r8:00000002 r7:60000113 r6:eaca1d8c r5:8521e000 r5:8521e000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85088c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8521e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaed000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529ab8c r4:8529a800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8529ab8c r4:8508a800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521e000 r8:8508a82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8508a800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508a800 r8:8027ed34 r7:eac95e60 r6:8508a880 r5:8521e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca1fb0 to 0xeaca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85088ac0 INFO: task kworker/1:253:4309 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) r5:80070113 r4:80239bd0 r4:00000000 r5:00001000 r4:ecb2b000 r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:254:4312 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:254 state:D stack:0 pid:4312 tgid:4312 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eac9dd84 r8:00000002 r7:60000113 r6:eac9dd8c r5:8521ec00 r4:8521ec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8521ec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac9de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85088f00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8521ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab05000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529b38c r4:8529b000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8529b38c r4:8508a900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521ec00 r8:8508a92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8508a900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508a900 r8:8027ed34 r7:eac95e60 r6:8508a980 r5:8521ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac9dfb0 to 0xeac9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8cc2c000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:255 state:D stack:0 pid:4313 tgid:4313 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8508aa00 r8:8027ed34 r7:eac9de60 r6:850af680 r5:84a08c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85088ac0 INFO: task kworker/1:255:4313 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8cd72000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf0340 r9:83018205 r8:84a09800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab4f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529bf8c r4:8529bc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8529bf8c r4:8508aa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a09800 r8:8508aaac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8508aa80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508aa80 r8:8027ed34 r7:eacade60 r6:850af700 r5:84a09800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacb9fb0 to 0xeacb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf01c0 INFO: task kworker/1:256:4316 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8d5c1000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:dffd5dc0 r4:00000000 r5:00001000 r4:ecb2b000 r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:257 state:D stack:0 pid:4317 tgid:4317 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:84a0bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 r7:ddde2d40 r6:83018200 r5:8529bb8c r4:8508ab00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508ab00 r8:8027ed34 r7:eacb9e60 r6:850af780 r5:84a0bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacbdfb0 to 0xeacbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf01c0 INFO: task kworker/1:257:4317 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8e0bf000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:258:4319 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:258 state:D stack:0 pid:4319 tgid:4319 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eacc5d84 r8:00000002 r7:60000113 r6:eacc5d8c r5:84a0b000 r4:84a0b000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a0b000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf0500 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r5:00001000 r4:eacdd000 r7:ddde2d40 r6:83018200 r5:852a078c r4:8508ab80 Exception stack(0xeacc5fb0 to 0xeacc5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84bf0100 INFO: task kworker/1:258:4319 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8e64a000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r4:84a0c800 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaccde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf03c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a0c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacd7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a038c r4:852a0000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a038c r4:8508ac00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a0c800 r8:8508ac2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8508ac00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508ac00 r8:8027ed34 r7:eacc5e60 r6:850af880 r5:84a0c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaccdfb0 to 0xeaccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf0300 INFO: task kworker/1:259:4321 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8ea6d000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:343:4323 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:343 state:D stack:0 pid:4323 tgid:4323 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eacd5d84 r8:00000002 r7:60000113 r6:eacd5d8c r5:84a0d400 r4:84a0d400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a0d400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84977b40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a0d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04bf000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85263f8c r4:85263c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85263f8c r4:850af900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a0d400 r8:850af92c r7:82804d40 r6:dddced40 r5:dddced60 r4:850af900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850af900 r8:8027ed34 r7:eac8de60 r6:850af980 r5:84a0d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd5fb0 to 0xeacd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508ea00 INFO: task kworker/0:343:4323 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8ea6d000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r5:00001000 r4:ecb2b000 r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:260:4325 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:260 state:D stack:0 pid:4325 tgid:4325 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eacf1d84 r8:00000002 r7:60000113 r6:eacf1d8c r5:84a0e000 r4:84a0e000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a0e000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf0d00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a0e000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa1b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a1f8c r4:852a1c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a1f8c r4:8508ac80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a0e000 r8:8508acac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8508ac80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508ac80 r8:8027ed34 r7:eacc5e60 r6:850afa00 r5:84a0e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf1fb0 to 0xeacf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf0400 INFO: task kworker/1:260:4325 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8ee47000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r5:00001000 r4:ecb2b000 r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:261:4327 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:261 state:D stack:0 pid:4327 tgid:4327 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eacf9d84 r8:00000002 r7:60000113 r6:eacf9d8c r5:84a0ec00 r4:84a0ec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a0ec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf0700 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a0ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eace9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a0b8c r4:852a0800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a0b8c r4:8508ad00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a0ec00 r8:8508ad2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8508ad00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508ad00 r8:8027ed34 r7:eacf1e60 r6:850afa80 r5:84a0ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf9fb0 to 0xeacf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf0540 INFO: task kworker/1:261:4327 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8f80e000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf0780 r7:ddde2d40 r6:83018200 r5:852a0f8c r4:8508ad80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf0540 INFO: task kworker/1:262:4329 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8fa11000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:263:4331 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:263 state:D stack:0 pid:4331 tgid:4331 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead1dd84 r8:00000002 r7:60000013 r6:ead1dd8c r5:844e0000 r4:844e0000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844e0000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead1de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf08c0 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a138c r4:852a1000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a138c r4:8508ae00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844e0000 r8:8508ae2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8508ae00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508ae00 r8:8027ed34 r7:eacf1e60 r6:850afb80 r5:844e0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead1dfb0 to 0xead1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf0540 INFO: task kworker/1:263:4331 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8fa12000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:264:4333 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:264 state:D stack:0 pid:4333 tgid:4333 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead29d84 r8:00000002 r7:60000113 r6:ead29d8c r5:844e1800 r4:844e1800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844e1800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead29e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf0ac0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead23000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a178c r4:852a1400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a178c r4:8508ae80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844e1800 r8:8508aeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8508ae80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508ae80 r8:8027ed34 r7:eacf1e60 r6:850afc00 r5:844e1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead29fb0 to 0xead29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf0900 INFO: task kworker/1:264:4333 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8ff76000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:265:4335 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:265 state:D stack:0 pid:4335 tgid:4335 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eaca9d84 r8:00000002 r7:60000113 r6:eaca9d8c r5:8521a400 r4:8521a400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8521a400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf0b40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8521a400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9e7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a1b8c r4:852a1800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a1b8c r4:8508af00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521a400 r8:8508af2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8508af00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508af00 r8:8027ed34 r7:eacf1e60 r6:8508af80 r5:8521a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca9fb0 to 0xeaca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf0cc0 INFO: task kworker/1:265:4335 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 8ff79000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:266:4338 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:266 state:D stack:0 pid:4338 tgid:4338 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead41d84 r8:00000002 r7:60000113 r6:ead41d8c r5:844e2400 r4:844e2400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844e2400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead41e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a338c r4:852a3000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a338c r4:84b7b000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844e2400 r8:84b7b02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7b000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7b000 r8:8027ed34 r7:eacf1e60 r6:850afc80 r5:844e2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead41fb0 to 0xead41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf0c40 INFO: task kworker/1:266:4338 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 90261000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:267:4339 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:267 state:D stack:0 pid:4339 tgid:4339 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead55d84 r8:00000002 r7:60000113 r6:ead55d8c r5:844e3c00 r4:844e3c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844e3c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead55e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508eac0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb55000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a238c r4:852a2000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a238c r4:84b7b080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844e3c00 r8:84b7b0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7b080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7b080 r8:8027ed34 r7:ead41e60 r6:850afd00 r5:844e3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead55fb0 to 0xead55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bf0c40 INFO: task kworker/1:267:4339 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 90768000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:268:4341 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:268 state:D stack:0 pid:4341 tgid:4341 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead5dd84 r8:00000002 r7:60000113 r6:ead5dd8c r5:844e5400 r4:844e5400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844e5400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead5de08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf0e80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a278c r4:852a2400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a278c r4:84b7b100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844e5400 r8:84b7b12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7b100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7b100 r8:8027ed34 r7:ead41e60 r6:850afd80 r5:844e5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead5dfb0 to 0xead5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508ebc0 INFO: task kworker/1:268:4341 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 90768000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:269:4343 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:269 state:D stack:0 pid:4343 tgid:4343 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead65d84 r8:00000002 r7:60000013 r6:ead65d8c r5:844e4800 r4:844e4800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844e4800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead65e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85088f80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:844e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff73000 r5:852a2b8c r4:852a2800 r10:00000000 r9:84b7b180 r8:8027ed34 r7:ead41e60 r6:850afe00 r5:844e4800 INFO: task kworker/1:269:4343 is blocked on a mutex likely owned by task kworker/1:86:3549. Exception stack(0xdffd5d20 to 0xdffd5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:270:4345 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:270 state:D stack:0 pid:4345 tgid:4345 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eabfdd84 r8:00000002 r7:60000013 r6:eabfdd8c r5:85216000 r4:85216000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85216000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabfde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84895480 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85216000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0043000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a2f8c r4:852a2c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a2f8c r4:84b7b200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:84b7b22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7b200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7b200 r8:8027ed34 r7:ead41e60 r6:84b7b280 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabfdfb0 to 0xeabfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 92a16000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:271:4348 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:271 state:D stack:0 pid:4348 tgid:4348 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead79d84 r8:00000002 r7:60000113 r6:ead79d8c r5:852d8000 r4:852d8000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852d8000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead79e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b664c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:852d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04a7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a3f8c r4:852a3c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a3f8c r4:84b7b300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d8000 r8:84b7b32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:84b7b300 r8:8027ed34 r7:ead41e60 r6:84b7b380 r5:852d8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead79fb0 to 0xead79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca5e08 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a378c r4:852a3400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a378c r4:84b7b400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d8c00 r8:84b7b42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7b400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7b400 r8:8027ed34 r7:ead79e60 r6:84b7b480 r5:852d8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca5fb0 to 0xeaca5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b660c0 INFO: task kworker/1:272:4349 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d60: 80070113 ffffffff r4:dffd5dc0 r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:273:4352 blocked for more than 477 seconds. r10:829185c4 r9:ead8dd84 r8:00000002 r7:60000113 r6:ead8dd8c r5:852d9800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead8de08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:852d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0471000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a3b8c r4:852a3800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a3b8c r4:84b7b500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d9800 r8:84b7b52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7b500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7b500 r8:8027ed34 r7:ead79e60 r6:84b7b580 r5:852d9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead8dfb0 to 0xead8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b662c0 INFO: task kworker/1:273:4352 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 94986000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:274:4354 blocked for more than 477 seconds. r10:829185c4 r9:ead95d84 r8:00000002 r7:60000013 r6:ead95d8c r5:852da400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead95e08 r4:00000000 [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r5:852a438c r4:852a4000 r10:61c88647 r9:852da400 r8:84b7b62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:274:4354 is blocked on a mutex likely owned by task kworker/1:86:3549. Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 95a2a000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:275:4356 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:275 state:D stack:0 pid:4356 tgid:4356 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead99d84 r8:00000002 r7:60000113 r6:ead99d8c r5:852db000 r4:852db000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852db000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead99e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd27c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:852db000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e064b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526378c r4:85263400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526378c r4:84b7b700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84b7b700 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:275:4356 is blocked on a mutex likely owned by task kworker/1:86:3549. r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 5d60: 80070113 ffffffff [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:276:4359 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:276 state:D stack:0 pid:4359 tgid:4359 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eadb9d84 r8:00000002 r7:60000013 r6:eadb9d8c r5:852dbc00 r4:852dbc00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852dbc00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66940 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:852dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8807000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a478c r4:852a4400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a478c r4:84b7b800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852dbc00 r8:84b7b82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7b800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7b800 r8:8027ed34 r7:ead99e60 r6:84b7b880 r5:852dbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadb9fb0 to 0xeadb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b66580 INFO: task kworker/1:276:4359 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 96a26000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:277:4361 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:277 state:D stack:0 pid:4361 tgid:4361 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eadbdd84 r8:00000002 r7:60000013 r6:eadbdd8c r5:852de000 r4:852de000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852de000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadbde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66b40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:852de000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8833000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a4b8c r4:852a4800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a4b8c r4:84b7b900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852de000 r8:84b7b92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7b900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7b900 r8:8027ed34 r7:eadb9e60 r6:84b7b980 r5:852de000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadbdfb0 to 0xeadbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b66900 INFO: task kworker/1:277:4361 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 96d91000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:278:4363 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:278 state:D stack:0 pid:4363 tgid:4363 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:ead91d84 r8:00000002 r7:60000013 r6:ead91d8c r5:852dc800 r4:852dc800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852dc800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead91e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66c40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:852dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e884b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a4f8c r4:852a4c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a4f8c r4:84b7ba00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852dc800 r8:84b7ba2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7ba00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7ba00 r8:8027ed34 r7:eadbde60 r6:84b7ba80 r5:852dc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead91fb0 to 0xead91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b66b00 INFO: task kworker/1:278:4363 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 972f2000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:279:4365 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:279 state:D stack:0 pid:4365 tgid:4365 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eada5d84 r8:00000002 r7:60000013 r6:eada5d8c r5:852dec00 r4:852dec00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852dec00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66e00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:852dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea895000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a538c r4:852a5000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a538c r4:84b7bb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeada5fb0 to 0xeada5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b66bc0 INFO: task kworker/1:279:4365 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 978c3000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:280:4367 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:280 state:D stack:0 pid:4367 tgid:4367 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eadc5d84 r8:00000002 r7:60000113 r6:eadc5d8c r5:852dd400 r4:852dd400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852dd400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b15000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:852dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9c9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a5b8c r4:852a5800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a5b8c r4:84b7bc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852dd400 r8:84b7bc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7bc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80070113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.16.0-rc2-syzkaller #0 task:kworker/1:281 state:D stack:0 pid:4369 tgid:4369 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eadc9d84 r8:00000002 r7:60000113 r6:eadc9d8c r5:852e0000 r4:852e0000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852e0000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508ebc0 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b7bd00 Exception stack(0xeadc9fb0 to 0xeadc9ff8) INFO: task kworker/1:281:4369 is blocked on a mutex likely owned by task kworker/1:86:3549. r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9888c000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:282:4370 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:282 state:D stack:0 pid:4370 tgid:4370 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eadcdd84 r8:00000002 r7:60000113 r6:eadcdd8c r5:852e0c00 r4:852e0c00 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852e0c00 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadcde08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b15340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:852e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9fb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a638c r4:852a6000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a638c r4:84b7be00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e0c00 r8:84b7be2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7be00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7be00 r8:8027ed34 r7:eadc5e60 r6:84b7be80 r5:852e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadcdfb0 to 0xeadcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b15100 INFO: task kworker/1:282:4370 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 98cad000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:283:4373 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:283 state:D stack:0 pid:4373 tgid:4373 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eadd1d84 r8:00000002 r7:60000113 r6:eadd1d8c r5:852e1800 r4:852e1800 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852e1800 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd1e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b151c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:852e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9dd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a5f8c r4:852a5c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a5f8c r4:84b7bf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e1800 r8:84b7bf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b7bf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7bf00 r8:8027ed34 r7:eadcde60 r6:84b7bf80 r5:852e1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd1fb0 to 0xeadd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b15180 INFO: task kworker/1:283:4373 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9a0a1000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:284:4375 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:284 state:D stack:0 pid:4375 tgid:4375 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eadd5d84 r8:00000002 r7:60000113 r6:eadd5d8c r5:852e2400 r4:852e2400 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852e2400 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd5e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b154c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:852e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa0f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a678c r4:852a6400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a678c r4:84b14000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e2400 r8:84b1402c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b14000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b14000 r8:8027ed34 r7:eadcde60 r6:84b14080 r5:852e2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd5fb0 to 0xeadd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b15280 INFO: task kworker/1:284:4375 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9b665000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:285:4377 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:285 state:D stack:0 pid:4377 tgid:4377 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28720>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27798>] (__schedule) from [<81a28720>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eadd9d84 r8:00000002 r7:60000113 r6:eadd9d8c r5:852e3000 r4:852e3000 [<81a286f4>] (schedule) from [<81a28b08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852e3000 r4:829185c0 [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a28af0>] (schedule_preempt_disabled) from [<81a2b1ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2aeec>] (__mutex_lock.constprop.0) from [<81a2b6b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd9e08 r4:00000000 [<81a2b6a4>] (__mutex_lock_slowpath) from [<81a2b6f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b6bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b15640 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:852e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa29000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a6b8c r4:852a6800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a6b8c r4:84b14100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e3000 r8:84b1412c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b14100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b14100 r8:8027ed34 r7:eadd5e60 r6:84b14180 r5:852e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd9fb0 to 0xeadd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b15400 INFO: task kworker/1:285:4377 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9bcb4000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffd5dc0 r5:dffd5e08 r4:dffd5dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1c80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd5fb0 to 0xdffd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b85b00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:286:4379 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:286 state:D stack:0 pid:4379 tgid:4379 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaddde08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b157c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:852e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa39000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a6f8c r4:852a6c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a6f8c r4:84b14200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e3c00 r8:84b1422c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b14200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b14200 r8:8027ed34 r7:eadd9e60 r6:84b14280 r5:852e3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadddfb0 to 0xeadddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b15580 INFO: task kworker/1:286:4379 is blocked on a mutex likely owned by task kworker/1:86:3549. task:kworker/1:86 state:R running task stack:0 pid:3549 tgid:3549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27798>] (__schedule) from [<81a28b54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:85012400 r8:80200be4 r7:dffd5d54 r6:ffffffff r5:85012400 r4:00000000 [<81a28b14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdffd5d20 to 0xdffd5d68) 5d20: 9c0b3000 dfea5000 00000001 80239bb8 7f341000 00000001 82abf1c4 82abe5a0 5d40: 7f341000 dfea5000 8280c9b4 dffd5d9c dffd5da0 dffd5d70 80230af4 80239bd0 5d60: 80070113 ffffffff r5:80070113 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e0df8c r4:85e0dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e0df8c r4:84be0e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84be0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84be0e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0e00 r8:8027ed34 r7:dffc9e60 r6:84be0e80 r5:85012400