Extracting prog: 13m53.990117188s Minimizing prog: 1h28m0.425578045s Simplifying prog options: 0s Extracting C: 9m13.95504239s Simplifying C: 1h0m2.021311942s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): socket$packet-bpf$PROG_LOAD-setsockopt$sock_attach_bpf detailed listing: executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x1, 0xb, &(0x7f0000000000)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x70}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) program did not crash program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): socket$packet-bpf$PROG_LOAD-setsockopt$sock_attach_bpf detailed listing: executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x1, 0xb, &(0x7f0000000000)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x70}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) program crashed: INFO: task hung in _vm_unmap_aliases single: successfully extracted reproducer found reproducer with 3 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): socket$packet-bpf$PROG_LOAD detailed listing: executing program 0: socket$packet(0x11, 0x3, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x1, 0xb, &(0x7f0000000000)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x70}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): socket$packet detailed listing: executing program 0: socket$packet(0x11, 0x3, 0x300) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x1, 0xb, &(0x7f0000000000)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x70}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x1, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x1, 0xb, &(0x7f0000000000)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x70}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 2h51m10.392191565s repro crashed as (corrupted=false): INFO: task kworker/1:0:23 blocked for more than 450 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df879d84 r8:00000002 r7:60000113 r6:df879d8c r5:8324a400 r4:8324a400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8324a400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df879e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85989840 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8324a400 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6a3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8596978c r4:85969400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8596978c r4:830cd080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324a400 r8:830cd0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:830cd080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd080 r8:8027ed34 r7:df819d50 r6:830cd100 r5:8324a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf879fb0 to 0xdf879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:830cb100 INFO: task kworker/1:0:23 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: ada9b000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 INFO: task kworker/0:2:43 blocked for more than 450 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df911d84 r8:00000002 r7:60000013 r6:df911d8c r5:833aa400 r4:833aa400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:833aa400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df911e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2680 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:833aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa51000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cb8c r4:8501c800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8501cb8c r4:83363680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833aa400 r8:833636ac r7:82804d40 r6:dddced40 r5:dddced60 r4:83363680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83363680 r8:8027ed34 r7:df841e60 r6:83363700 r5:833aa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8333e9c0 INFO: task kworker/0:2:43 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: ade87000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 INFO: task kworker/1:2:96 blocked for more than 450 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:96 tgid:96 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9bdd84 r8:00000002 r7:60000113 r6:df9bdd8c r5:83add400 r4:83add400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83add400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9bde08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a1b480 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83add400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbcd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ad678c r4:84ad6400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ad678c r4:83908580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83add400 r8:839085ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83908580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83908580 r8:8027ed34 r7:df955e60 r6:83382880 r5:83add400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9bdfb0 to 0xdf9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8393e740 INFO: task kworker/1:2:96 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: ae1f0000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 INFO: task kworker/1:1:3103 blocked for more than 450 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:3103 tgid:3103 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df979d84 r8:00000002 r7:60000113 r6:df979d8c r5:838a5400 r4:838a5400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838a5400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df979e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84691b00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:838a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df95b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ad5b8c r4:84ad5800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ad5b8c r4:848c0d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838a5400 r8:848c0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:848c0d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c0d00 r8:8027ed34 r7:df9bde60 r6:846a4e00 r5:838a5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf979fb0 to 0xdf979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846c51c0 INFO: task kworker/1:1:3103 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: ae631000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 INFO: task kworker/1:3:3112 blocked for more than 450 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:3112 tgid:3112 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9c5d84 r8:00000002 r7:60000113 r6:df9c5d8c r5:83b28c00 r4:83b28c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b28c00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c5e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a1f780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83b28c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05bf000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ad778c r4:84ad7400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ad778c r4:848c0800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b28c00 r8:848c082c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:848c0800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c0800 r8:8027ed34 r7:df9bde60 r6:846a4b00 r5:83b28c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c5fb0 to 0xdf9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848ca380 INFO: task kworker/1:3:3112 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: aea11000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 INFO: task kworker/0:3:3113 blocked for more than 450 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:3113 tgid:3113 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9c9d84 r8:00000002 r7:60000113 r6:df9c9d8c r5:83b28000 r4:83b28000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b28000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c9e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a1fa00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83b28000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc83000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b4bf8c r4:84b4bc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b4bf8c r4:846a4500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b28000 r8:846a452c r7:82804d40 r6:dddced40 r5:dddced60 r4:846a4500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846a4500 r8:8027ed34 r7:df911e60 r6:846a4f80 r5:83b28000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c9fb0 to 0xdf9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848cc940 INFO: task kworker/0:3:3113 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: aef1d000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 INFO: task kworker/1:4:3114 blocked for more than 450 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:0 pid:3114 tgid:3114 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9cdd84 r8:00000002 r7:60000113 r6:df9cdd8c r5:841c9800 r4:841c9800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:841c9800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9cde08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85989c40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:841c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7ef000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8596a38c r4:8596a000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8596a38c r4:848c0780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841c9800 r8:848c07ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:848c0780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c0780 r8:8027ed34 r7:df9c5e60 r6:840e0180 r5:841c9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9cdfb0 to 0xdf9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848ca380 INFO: task kworker/1:4:3114 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: af335000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 INFO: task kworker/1:5:3115 blocked for more than 450 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3115 tgid:3115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9d1d84 r8:00000002 r7:60000113 r6:df9d1d8c r5:83b16c00 r4:83b16c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b16c00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d1e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bda8c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83b16c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04c9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7478c r4:84b74400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b7478c r4:848c0700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b16c00 r8:848c072c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:848c0700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c0700 r8:8027ed34 r7:df9cde60 r6:8336bf80 r5:83b16c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d1fb0 to 0xdf9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848ca380 INFO: task kworker/1:5:3115 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: af74b000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 INFO: task kworker/0:4:3118 blocked for more than 450 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3118 tgid:3118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9d5d84 r8:00000002 r7:60000113 r6:df9d5d8c r5:83b2a400 r4:83b2a400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b2a400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d5e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e8e40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83b2a400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfce1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502678c r4:85026400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502678c r4:830cd300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b2a400 r8:830cd32c r7:82804d40 r6:dddced40 r5:dddced60 r4:830cd300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd300 r8:8027ed34 r7:df911e60 r6:830cd280 r5:83b2a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d5fb0 to 0xdf9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848ccdc0 INFO: task kworker/0:4:3118 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: af80a000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 INFO: task kworker/0:5:3120 blocked for more than 450 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3120 tgid:3120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9e1d84 r8:00000002 r7:60000113 r6:df9e1d8c r5:83906000 r4:83906000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83906000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e1e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfec00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83906000 r7:00000000 r6:83018000 r5:00001000 r4:7f015000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df96f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502638c r4:85026000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8502638c r4:83375400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83906000 r8:8337542c r7:82804d40 r6:dddced40 r5:dddced60 r4:83375400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83375400 r8:8027ed34 r7:df9d5e60 r6:8336ba00 r5:83906000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e1fb0 to 0xdf9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848ccd80 INFO: task kworker/0:5:3120 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: afda1000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:6:3122 blocked for more than 450 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3122 tgid:3122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9e9d84 r8:00000002 r7:60000113 r6:df9e9d8c r5:83900c00 r4:83900c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83900c00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e9e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85989a80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83900c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6c3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85969b8c r4:85969800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85969b8c r4:848c0680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83900c00 r8:848c06ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:848c0680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c0680 r8:8027ed34 r7:df9cde60 r6:8336be00 r5:83900c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e9fb0 to 0xdf9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848ca4c0 INFO: task kworker/1:6:3122 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: aff96000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:6:3124 blocked for more than 450 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3124 tgid:3124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df9f5d84 r8:00000002 r7:60000013 r6:df9f5d8c r5:83b12400 r4:83b12400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b12400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514dec0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83b12400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844bbb8c r4:844bb800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:844bbb8c r4:846ca780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b12400 r8:846ca7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:846ca780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ca780 r8:8027ed34 r7:df9d5e60 r6:846ca800 r5:83b12400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8467b100 INFO: task kworker/0:6:3124 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b0359000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:7:3126 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:df97dd84 r8:00000002 r7:60000113 r6:df97dd8c r5:841fb000 r4:841fb000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:841fb000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df97de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854710c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:841fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04d1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537238c r4:85372000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8537238c r4:84644b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841fb000 r8:84644b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84644b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84644b00 r8:8027ed34 r7:df9f5e60 r6:848c0600 r5:841fb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf97dfb0 to 0xdf97dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8467b280 INFO: task kworker/0:7:3126 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b0618000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:8:3128 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3128 tgid:3128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa15d84 r8:00000002 r7:60000113 r6:dfa15d8c r5:841fec00 r4:841fec00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:841fec00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa15e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500e900 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:841fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851bbf8c r4:851bbc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851bbf8c r4:84644380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841fec00 r8:846443ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84644380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84644380 r8:8027ed34 r7:df97de60 r6:848c0380 r5:841fec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa15fb0 to 0xdfa15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8467b380 INFO: task kworker/0:8:3128 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b0618000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3130 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa0dd84 r8:00000002 r7:60000113 r6:dfa0dd8c r5:841fc800 r4:841fc800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:841fc800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa0de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521b540 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:841fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e061d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c8b8c r4:851c8800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851c8b8c r4:84644180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841fc800 r8:846441ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84644180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84644180 r8:8027ed34 r7:df97de60 r6:848c0580 r5:841fc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8467b440 INFO: task kworker/0:9:3130 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b08df000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3131 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa1dd84 r8:00000002 r7:60000113 r6:dfa1dd8c r5:833ad400 r4:833ad400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:833ad400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa1de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b59c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:833ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e46ca000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cab8c r4:851ca800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851cab8c r4:84644c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833ad400 r8:84644cac r7:82804d40 r6:dddced40 r5:dddced60 r4:84644c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84644c80 r8:8027ed34 r7:df97de60 r6:848c0400 r5:833ad400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa1dfb0 to 0xdfa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8467b440 INFO: task kworker/0:10:3131 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b0a12000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3133 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3133 tgid:3133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa31d84 r8:00000002 r7:60000113 r6:dfa31d8c r5:8325a400 r4:8325a400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8325a400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85313900 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8325a400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03ff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cbf8c r4:851cbc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851cbf8c r4:84644f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8325a400 r8:84644fac r7:82804d40 r6:dddced40 r5:dddced60 r4:84644f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84644f80 r8:8027ed34 r7:df97de60 r6:848c0480 r5:8325a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa31fb0 to 0xdfa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8467b680 INFO: task kworker/0:11:3133 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b0d7d000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3135 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3135 tgid:3135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa3dd84 r8:00000002 r7:60000113 r6:dfa3dd8c r5:83afb000 r4:83afb000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83afb000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa3de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85322d80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83afb000 r7:00000000 r6:83018000 r5:00001000 r4:7f015000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9f1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851e978c r4:851e9400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851e978c r4:84644680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83afb000 r8:846446ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84644680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84644680 r8:8027ed34 r7:df97de60 r6:848c0500 r5:83afb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa3dfb0 to 0xdfa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8467b780 INFO: task kworker/0:12:3135 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b0def000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3137 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa4dd84 r8:00000002 r7:60000113 r6:dfa4dd8c r5:83b03000 r4:83b03000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b03000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa4de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85426840 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83b03000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabd5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a838c r4:853a8000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853a838c r4:84644400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b03000 r8:8464442c r7:82804d40 r6:dddced40 r5:dddced60 r4:84644400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84644400 r8:8027ed34 r7:df97de60 r6:848c0300 r5:83b03000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa4dfb0 to 0xdfa4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8467b840 INFO: task kworker/0:13:3137 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b11ec000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3139 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa59d84 r8:00000002 r7:60000113 r6:dfa59d8c r5:83b04800 r4:83b04800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b04800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85435780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83b04800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea89f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ebb8c r4:851eb800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851ebb8c r4:830b8480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b04800 r8:830b84ac r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8480 r8:8027ed34 r7:df97de60 r6:848c0280 r5:83b04800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa59fb0 to 0xdfa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8467b980 INFO: task kworker/0:14:3139 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b146a000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3141 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3141 tgid:3141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa6dd84 r8:00000002 r7:60000113 r6:dfa6dd8c r5:83b03c00 r4:83b03c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b03c00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa6de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85466040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83b03c00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafa1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85370f8c r4:85370c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85370f8c r4:830b8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b03c00 r8:830b842c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:8027ed34 r7:df97de60 r6:848c0200 r5:83b03c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa6dfb0 to 0xdfa6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8467bac0 INFO: task kworker/0:15:3141 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b1612000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3143 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3143 tgid:3143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa75d84 r8:00000002 r7:60000113 r6:dfa75d8c r5:83b01800 r4:83b01800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b01800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85762640 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83b01800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb835000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8559df8c r4:8559dc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8559df8c r4:84644000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b01800 r8:8464402c r7:82804d40 r6:dddced40 r5:dddced60 r4:84644000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84644000 r8:8027ed34 r7:df97de60 r6:848c0180 r5:83b01800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa75fb0 to 0xdfa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8467bc00 INFO: task kworker/0:16:3143 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b17b2000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3145 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3145 tgid:3145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa85d84 r8:00000002 r7:60000113 r6:dfa85d8c r5:833bbc00 r4:833bbc00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:833bbc00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa85e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8554f8c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:833bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac6d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537378c r4:85373400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8537378c r4:848d6000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833bbc00 r8:848d602c r7:82804d40 r6:dddced40 r5:dddced60 r4:848d6000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d6000 r8:8027ed34 r7:dfa75e60 r6:848c0100 r5:833bbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa85fb0 to 0xdfa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8467bd40 INFO: task kworker/0:17:3145 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b1916000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3147 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3147 tgid:3147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfa99d84 r8:00000002 r7:60000013 r6:dfa99d8c r5:833be000 r4:833be000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:833be000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa99e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85560c00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:833be000 r7:00000000 r6:83018000 r5:00001000 r4:7f015000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa3f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844bdf8c r4:844bdc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:844bdf8c r4:848d6080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833be000 r8:848d60ac r7:82804d40 r6:dddced40 r5:dddced60 r4:848d6080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d6080 r8:8027ed34 r7:dfa75e60 r6:848c0080 r5:833be000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa99fb0 to 0xdfa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8467bfc0 INFO: task kworker/0:18:3147 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b1bb0000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3149 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3149 tgid:3149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfaa5d84 r8:00000002 r7:60000113 r6:dfaa5d8c r5:833bec00 r4:833bec00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:833bec00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85544180 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:833bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5dd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8558fb8c r4:8558f800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8558fb8c r4:848d6100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833bec00 r8:848d612c r7:82804d40 r6:dddced40 r5:dddced60 r4:848d6100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d6100 r8:8027ed34 r7:dfa75e60 r6:848c0000 r5:833bec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848df080 INFO: task kworker/0:19:3149 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b2050000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3151 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfaadd84 r8:00000002 r7:60000113 r6:dfaadd8c r5:83ad8000 r4:83ad8000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ad8000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaade08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ccb40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83ad8000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf6d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8564eb8c r4:8564e800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8564eb8c r4:848d6180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad8000 r8:848d61ac r7:82804d40 r6:dddced40 r5:dddced60 r4:848d6180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d6180 r8:8027ed34 r7:dfa75e60 r6:848c0c00 r5:83ad8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaadfb0 to 0xdfaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848df080 INFO: task kworker/0:20:3151 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b22e3000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3154 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfabdd84 r8:00000002 r7:60000113 r6:dfabdd8c r5:83ade000 r4:83ade000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ade000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfabde08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85733a00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83ade000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6cd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8559d78c r4:8559d400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8559d78c r4:848d6200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ade000 r8:848d622c r7:82804d40 r6:dddced40 r5:dddced60 r4:848d6200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d6200 r8:8027ed34 r7:dfa75e60 r6:848c0880 r5:83ade000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfabdfb0 to 0xdfabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848df2c0 INFO: task kworker/0:21:3154 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b2463000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3156 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfac9d84 r8:00000002 r7:60000113 r6:dfac9d8c r5:83adec00 r4:83adec00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83adec00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576bf00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83adec00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb407000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8559ef8c r4:8559ec00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8559ef8c r4:848d6280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83adec00 r8:848d62ac r7:82804d40 r6:dddced40 r5:dddced60 r4:848d6280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d6280 r8:8027ed34 r7:dfa75e60 r6:848c0c80 r5:83adec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac9fb0 to 0xdfac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848df3c0 INFO: task kworker/0:22:3156 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b27b4000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3158 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3158 tgid:3158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfad1d84 r8:00000002 r7:60000113 r6:dfad1d8c r5:838b8c00 r4:838b8c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838b8c00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad1e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582d640 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:838b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9ed000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844bf78c r4:844bf400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:844bf78c r4:848d6300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838b8c00 r8:848d632c r7:82804d40 r6:dddced40 r5:dddced60 r4:848d6300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d6300 r8:8027ed34 r7:dfac9e60 r6:848c0b80 r5:838b8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad1fb0 to 0xdfad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848df500 INFO: task kworker/0:23:3158 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b27b4000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3160 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfaddd84 r8:00000002 r7:60000113 r6:dfaddd8c r5:841f1800 r4:841f1800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:841f1800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfadde08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848eeec0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:841f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec595000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d438c r4:856d4000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856d438c r4:848d6380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841f1800 r8:848d63ac r7:82804d40 r6:dddced40 r5:dddced60 r4:848d6380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d6380 r8:8027ed34 r7:dfad1e60 r6:848c0b00 r5:841f1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaddfb0 to 0xdfaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848df640 INFO: task kworker/0:24:3160 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b2ad4000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3163 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfaf9d84 r8:00000002 r7:60000113 r6:dfaf9d8c r5:841f3c00 r4:841f3c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:841f3c00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848eef40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:841f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfad3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d478c r4:856d4400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856d478c r4:848d6400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841f3c00 r8:848d642c r7:82804d40 r6:dddced40 r5:dddced60 r4:848d6400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d6400 r8:8027ed34 r7:dfadde60 r6:848c0a80 r5:841f3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848df980 INFO: task kworker/0:25:3163 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b2bb9000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3164 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfaa9d84 r8:00000002 r7:60000113 r6:dfaa9d8c r5:83901800 r4:83901800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83901800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa9e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f27c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83901800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4ef000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849dc78c r4:849dc400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849dc78c r4:848d6480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83901800 r8:848d64ac r7:82804d40 r6:dddced40 r5:dddced60 r4:848d6480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d6480 r8:8027ed34 r7:dfaf9e60 r6:848d6500 r5:83901800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa9fb0 to 0xdfaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848df980 INFO: task kworker/0:26:3164 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b2fbe000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3166 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3166 tgid:3166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfaf1d84 r8:00000002 r7:60000113 r6:dfaf1d8c r5:83904800 r4:83904800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83904800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf1e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f2740 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83904800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb081000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856d7f8c r4:856d7c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856d7f8c r4:848d6580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83904800 r8:848d65ac r7:82804d40 r6:dddced40 r5:dddced60 r4:848d6580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d6580 r8:8027ed34 r7:dfaa9e60 r6:848d6600 r5:83904800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf1fb0 to 0xdfaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848df9c0 INFO: task kworker/0:27:3166 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b33c6000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3168 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3168 tgid:3168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfafdd84 r8:00000002 r7:60000113 r6:dfafdd8c r5:83b10000 r4:83b10000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b10000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfafde08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85151b40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83b10000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb589000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858e478c r4:858e4400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858e478c r4:848d6680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b10000 r8:848d66ac r7:82804d40 r6:dddced40 r5:dddced60 r4:848d6680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d6680 r8:8027ed34 r7:dfaf1e60 r6:848d6700 r5:83b10000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfafdfb0 to 0xdfafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848dfbc0 INFO: task kworker/0:28:3168 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b36b0000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3170 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb09d84 r8:00000002 r7:60000113 r6:dfb09d8c r5:83aca400 r4:83aca400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aca400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85406040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83aca400 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaff000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8590078c r4:85900400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8590078c r4:848d6780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aca400 r8:848d67ac r7:82804d40 r6:dddced40 r5:dddced60 r4:848d6780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d6780 r8:8027ed34 r7:dfafde60 r6:848d6800 r5:83aca400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb09fb0 to 0xdfb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848dfd40 INFO: task kworker/0:29:3170 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b36b0000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3172 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3172 tgid:3172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb11d84 r8:00000002 r7:60000113 r6:dfb11d8c r5:83acb000 r4:83acb000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83acb000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb11e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520d500 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83acb000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec291000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8596678c r4:85966400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8596678c r4:848d6880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83acb000 r8:848d68ac r7:82804d40 r6:dddced40 r5:dddced60 r4:848d6880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d6880 r8:8027ed34 r7:dfb09e60 r6:848d6900 r5:83acb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb11fb0 to 0xdfb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848ca640 INFO: task kworker/0:30:3172 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b39dc000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3174 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb25d84 r8:00000002 r7:60000113 r6:dfb25d8c r5:83ac8000 r4:83ac8000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ac8000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb25e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85993e40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83ac8000 r7:00000000 r6:83018000 r5:00001000 r4:7f015000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaed000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858e778c r4:858e7400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858e778c r4:848d6a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac8000 r8:848d6a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:848d6a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d6a00 r8:8027ed34 r7:dfb09e60 r6:848d6a80 r5:83ac8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb25fb0 to 0xdfb25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848dffc0 INFO: task kworker/0:31:3174 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b3cca000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:3178 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:3178 tgid:3178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb31d84 r8:00000002 r7:60000113 r6:dfb31d8c r5:83acd400 r4:83acd400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83acd400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb31e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858baac0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:83acd400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec357000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a09f8c r4:85a09c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a09f8c r4:848d6c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83acd400 r8:848d6c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:848d6c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d6c00 r8:8027ed34 r7:df969e60 r6:848d6c80 r5:83acd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb31fb0 to 0xdfb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848ef200 INFO: task kworker/0:33:3178 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b4012000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:7:3182 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3182 tgid:3182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb3dd84 r8:00000002 r7:60000113 r6:dfb3dd8c r5:841f0000 r4:841f0000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:841f0000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb3de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85989d00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:841f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7fb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8596a78c r4:8596a400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8596a78c r4:848c0a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841f0000 r8:848c0a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:848c0a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c0a00 r8:8027ed34 r7:df9cde60 r6:848c0e00 r5:841f0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb3dfb0 to 0xdfb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848e3f00 INFO: task kworker/1:7:3182 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b4542000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3186 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3186 tgid:3186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb61d84 r8:00000002 r7:60000113 r6:dfb61d8c r5:83acbc00 r4:83acbc00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83acbc00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb61e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85989e00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83acbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec811000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8596ab8c r4:8596a800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8596ab8c r4:848c0d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83acbc00 r8:848c0dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:848c0d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c0d80 r8:8027ed34 r7:dfb3de60 r6:848d6e00 r5:83acbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb61fb0 to 0xdfb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848e3b40 INFO: task kworker/1:8:3186 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b4542000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3189 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb6dd84 r8:00000002 r7:60000013 r6:dfb6dd8c r5:83ad0c00 r4:83ad0c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ad0c00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb6de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a4140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83ad0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec83b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8596b78c r4:8596b400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8596b78c r4:848c0f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad0c00 r8:848c0fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:848c0f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c0f80 r8:8027ed34 r7:dfb61e60 r6:848d6f00 r5:83ad0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb6dfb0 to 0xdfb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848e3500 INFO: task kworker/1:9:3189 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b4b2a000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3190 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3190 tgid:3190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb75d84 r8:00000002 r7:60000113 r6:dfb75d8c r5:83ace000 r4:83ace000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ace000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb75e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85989fc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:83ace000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec81d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8596af8c r4:8596ac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8596af8c r4:848c0f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ace000 r8:848c0f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:848c0f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c0f00 r8:8027ed34 r7:dfb6de60 r6:848d6f80 r5:83ace000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb75fb0 to 0xdfb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8491d0c0 INFO: task kworker/1:10:3190 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b4b2a000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3192 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb7dd84 r8:00000002 r7:60000113 r6:dfb7dd8c r5:84840c00 r4:84840c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84840c00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb7de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a4040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84840c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec82f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8596b38c r4:8596b000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8596b38c r4:848c0e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84840c00 r8:848c0eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:848c0e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c0e80 r8:8027ed34 r7:dfb6de60 r6:84644100 r5:84840c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8491d080 INFO: task kworker/1:11:3192 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b50dc000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3195 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3195 tgid:3195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb91d84 r8:00000002 r7:60000113 r6:dfb91d8c r5:84840000 r4:84840000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84840000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb91e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a4340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84840000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9b1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8596bf8c r4:8596bc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8596bf8c r4:83fa8700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84840000 r8:83fa872c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83fa8700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83fa8700 r8:8027ed34 r7:dfb6de60 r6:848e0000 r5:84840000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb91fb0 to 0xdfb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8491d2c0 INFO: task kworker/1:12:3195 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b5478000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3196 blocked for more than 451 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfb95d84 r8:00000002 r7:60000113 r6:dfb95d8c r5:84842400 r4:84842400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84842400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb95e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a4280 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84842400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec887000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8596bb8c r4:8596b800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8596bb8c r4:832a0000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84842400 r8:832a002c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:832a0000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a0000 r8:8027ed34 r7:dfb91e60 r6:848e0080 r5:84842400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb95fb0 to 0xdfb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8491d2c0 INFO: task kworker/1:13:3196 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b5478000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3199 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbadd84 r8:00000002 r7:60000113 r6:dfbadd8c r5:84844800 r4:84844800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84844800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbade08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a44c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84844800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9c5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8597478c r4:85974400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8597478c r4:848c0900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84844800 r8:848c092c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:848c0900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c0900 r8:8027ed34 r7:dfb91e60 r6:848e0100 r5:84844800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbadfb0 to 0xdfbadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8491d580 INFO: task kworker/1:14:3199 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b582b000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3200 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3200 tgid:3200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbb9d84 r8:00000002 r7:60000113 r6:dfbb9d8c r5:84845400 r4:84845400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84845400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb9e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a43c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84845400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9bf000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8597438c r4:85974000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8597438c r4:832d1680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84845400 r8:832d16ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:832d1680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832d1680 r8:8027ed34 r7:dfbade60 r6:848e0180 r5:84845400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb9fb0 to 0xdfbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8491d7c0 INFO: task kworker/1:15:3200 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b5cdd000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3204 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3204 tgid:3204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbc9d84 r8:00000002 r7:60000113 r6:dfbc9d8c r5:84843000 r4:84843000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84843000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc9e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a46c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84843000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9d9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85974f8c r4:85974c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85974f8c r4:83908380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84843000 r8:839083ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83908380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83908380 r8:8027ed34 r7:dfbade60 r6:848e0300 r5:84843000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc9fb0 to 0xdfbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8491d880 INFO: task kworker/1:16:3204 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b5cdd000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3205 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3205 tgid:3205 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbd1d84 r8:00000002 r7:60000113 r6:dfbd1d8c r5:84846000 r4:84846000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84846000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd1e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a45c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84846000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9d3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85974b8c r4:85974800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85974b8c r4:83349880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84846000 r8:833498ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83349880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83349880 r8:8027ed34 r7:dfbc9e60 r6:848e0380 r5:84846000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd1fb0 to 0xdfbd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8491da00 INFO: task kworker/1:17:3205 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b609c000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3207 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3207 tgid:3207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbd9d84 r8:00000002 r7:60000113 r6:dfbd9d8c r5:84843c00 r4:84843c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84843c00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a4e40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84843c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb75f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85975f8c r4:85975c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85975f8c r4:83349800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84843c00 r8:8334982c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83349800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83349800 r8:8027ed34 r7:dfbc9e60 r6:848e0200 r5:84843c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd9fb0 to 0xdfbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8491db80 INFO: task kworker/1:18:3207 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b609c000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3208 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfba9d84 r8:00000002 r7:60000113 r6:dfba9d8c r5:84940c00 r4:84940c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84940c00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba9e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a48c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84940c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9e3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8597538c r4:85975000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8597538c r4:83908480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84940c00 r8:839084ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83908480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83908480 r8:8027ed34 r7:dfbd9e60 r6:8421b300 r5:84940c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba9fb0 to 0xdfba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8491db80 INFO: task kworker/1:19:3208 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b64a2000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3211 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3211 tgid:3211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfbd5d84 r8:00000002 r7:60000113 r6:dfbd5d8c r5:84941800 r4:84941800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84941800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd5e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a4f00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84941800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb95b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8597638c r4:85976000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8597638c r4:8421b280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84941800 r8:8421b2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8421b280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8421b280 r8:8027ed34 r7:dfbd9e60 r6:84371800 r5:84941800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd5fb0 to 0xdfbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8491dd80 INFO: task kworker/1:20:3211 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b6930000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3215 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3215 tgid:3215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc05d84 r8:00000002 r7:60000113 r6:dfc05d8c r5:84846c00 r4:84846c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84846c00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc05e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a4f80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84846c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9bd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8597678c r4:85976400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8597678c r4:848ec080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84846c00 r8:848ec0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:848ec080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ec080 r8:8027ed34 r7:dfc01e60 r6:848e0400 r5:84846c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc05fb0 to 0xdfc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848ef4c0 INFO: task kworker/1:22:3215 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b6930000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3216 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3216 tgid:3216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc09d84 r8:00000002 r7:60000113 r6:dfc09d8c r5:84710000 r4:84710000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84710000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc09e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a4b80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84710000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec33d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85976b8c r4:85976800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85976b8c r4:848ec100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84710000 r8:848ec12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:848ec100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ec100 r8:8027ed34 r7:dfc01e60 r6:848e0480 r5:84710000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc09fb0 to 0xdfc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848ef4c0 INFO: task kworker/1:23:3216 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b7085000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3218 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc19d84 r8:00000002 r7:60000113 r6:dfc19d8c r5:84711800 r4:84711800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84711800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc19e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b0040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84711800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec48d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85976f8c r4:85976c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85976f8c r4:848ec180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84711800 r8:848ec1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:848ec180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ec180 r8:8027ed34 r7:dfc01e60 r6:848e0500 r5:84711800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc19fb0 to 0xdfc19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848de0c0 INFO: task kworker/1:24:3218 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b7287000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3220 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3220 tgid:3220 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc25d84 r8:00000002 r7:60000113 r6:dfc25d8c r5:84710c00 r4:84710c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84710c00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc25e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b0140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84710c00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4f3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8597738c r4:85977000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8597738c r4:848ec200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84710c00 r8:848ec22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:848ec200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ec200 r8:8027ed34 r7:dfc01e60 r6:848e0580 r5:84710c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc25fb0 to 0xdfc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848de0c0 INFO: task kworker/1:25:3220 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b76c7000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3223 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3223 tgid:3223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfc3dd84 r8:00000002 r7:60000113 r6:dfc3dd8c r5:84712400 r4:84712400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84712400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc3de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859b01c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84712400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec50d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8597778c r4:85977400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8597778c r4:848ec280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84712400 r8:848ec2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:848ec280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ec280 r8:8027ed34 r7:dfc01e60 r6:848e0600 r5:84712400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc3dfb0 to 0xdfc3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848de0c0 INFO: task kworker/1:26:3223 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b76c7000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:105:3470 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:105 state:D stack:0 pid:3470 tgid:3470 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfed5d84 r8:00000002 r7:60000113 r6:dfed5d8c r5:84a96000 r4:84a96000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a96000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfed5e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84691dc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a96000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa03000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ad638c r4:84ad6000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ad638c r4:848c5580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a96000 r8:848c55ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:848c5580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c5580 r8:8027ed34 r7:dfeb5e60 r6:848c5600 r5:84a96000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfed5fb0 to 0xdfed5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849db7c0 INFO: task kworker/1:105:3470 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b7c66000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:106:3471 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:106 state:D stack:0 pid:3471 tgid:3471 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfebdd84 r8:00000002 r7:60000113 r6:dfebdd8c r5:84a96c00 r4:84a96c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a96c00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfebde08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84691b80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a96c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ad000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ad5f8c r4:84ad5c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84ad5f8c r4:848c5700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a96c00 r8:848c572c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:848c5700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c5700 r8:8027ed34 r7:dfed5e60 r6:848c5780 r5:84a96c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfebdfb0 to 0xdfebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849db900 INFO: task kworker/1:106:3471 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b7e45000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:84:3485 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:84 state:D stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff01d84 r8:00000002 r7:60000013 r6:dff01d8c r5:84a9d400 r4:84a9d400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a9d400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff01e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d4340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff37000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84747f8c r4:84747c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84747f8c r4:848dcf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9d400 r8:848dcf2c r7:82804d40 r6:dddced40 r5:dddced60 r4:848dcf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dcf00 r8:8027ed34 r7:dfef9e60 r6:848c5b00 r5:84a9d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff01fb0 to 0xdff01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecc80 INFO: task kworker/0:84:3485 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b833c000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:85:3487 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:85 state:D stack:0 pid:3487 tgid:3487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff09d84 r8:00000002 r7:60000113 r6:dff09d8c r5:84a9e000 r4:84a9e000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a9e000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff09e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecdc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474678c r4:84746400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f000 r8:8027ed34 r7:dff01e60 r6:848c5b80 r5:84a9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff09fb0 to 0xdff09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecec0 INFO: task kworker/0:85:3487 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b86d4000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:86:3488 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:86 state:D stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff0dd84 r8:00000002 r7:60000113 r6:dff0dd8c r5:84a9c800 r4:84a9c800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a9c800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff0de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 INFO: task kworker/0:86:3488 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b8ab4000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:87:3491 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:87 state:D stack:0 pid:3491 tgid:3491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff19d84 r8:00000002 r7:60000113 r6:dff19d8c r5:84760c00 r4:84760c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84760c00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff19e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cc800 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84760c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdfd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746f8c r4:84746c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746f8c r4:8468f100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84760c00 r8:8468f12c r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f100 r8:8027ed34 r7:dff01e60 r6:848c5c80 r5:84760c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff19fb0 to 0xdff19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecf00 INFO: task kworker/0:87:3491 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b8ab4000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:88:3492 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:88 state:D stack:0 pid:3492 tgid:3492 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff1dd84 r8:00000002 r7:60000013 r6:dff1dd8c r5:84761800 r4:84761800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84761800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff1de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849dbe40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84761800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe0b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474738c r4:84747000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474738c r4:8468f300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84761800 r8:8468f32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f300 r8:8027ed34 r7:dff01e60 r6:848c5d00 r5:84761800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff1dfb0 to 0xdff1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849db2c0 INFO: task kworker/0:88:3492 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b8e56000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:89:3494 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:89 state:D stack:0 pid:3494 tgid:3494 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff29d84 r8:00000002 r7:60000013 r6:dff29d8c r5:84760000 r4:84760000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84760000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff29e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d4000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84760000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe15000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474778c r4:84747400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474778c r4:8468f180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84760000 r8:8468f1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f180 r8:8027ed34 r7:dff01e60 r6:848c5d80 r5:84760000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff29fb0 to 0xdff29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846d40c0 INFO: task kworker/0:89:3494 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b9168000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:90:3496 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:90 state:D stack:0 pid:3496 tgid:3496 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfeb9d84 r8:00000002 r7:60000013 r6:dfeb9d8c r5:849be000 r4:849be000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849be000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfeb9e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d4180 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849be000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff25000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84747b8c r4:84747800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84747b8c r4:8468f200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849be000 r8:8468f22c r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f200 r8:8027ed34 r7:dff01e60 r6:8468f280 r5:849be000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfeb9fb0 to 0xdfeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846d4280 INFO: task kworker/0:90:3496 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b98b9000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:91:3500 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:91 state:D stack:0 pid:3500 tgid:3500 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff2dd84 r8:00000002 r7:60000113 r6:dff2dd8c r5:849bec00 r4:849bec00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849bec00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff2de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d4640 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff4b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8468078c r4:84680400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8468078c r4:8468f380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849bec00 r8:8468f3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f380 r8:8027ed34 r7:dff01e60 r6:8468f400 r5:849bec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff2dfb0 to 0xdff2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846d4300 INFO: task kworker/0:91:3500 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b98b9000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:92:3501 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:92 state:D stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dfef5d84 r8:00000002 r7:60000113 r6:dfef5d8c r5:849bb000 r4:849bb000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849bb000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfef5e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d43c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:849bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff3d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8468038c r4:84680000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8468038c r4:8468f480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849bb000 r8:8468f4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f480 r8:8027ed34 r7:dff2de60 r6:8468f500 r5:849bb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef5fb0 to 0xdfef5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846d4300 INFO: task kworker/0:92:3501 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: b9e44000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:93:3503 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:93 state:D stack:0 pid:3503 tgid:3503 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff49d84 r8:00000002 r7:60000113 r6:dff49d8c r5:84860000 r4:84860000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84860000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff49e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d4780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84860000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff51000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84680b8c r4:84680800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84680b8c r4:8468f580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84860000 r8:8468f5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f580 r8:8027ed34 r7:dff2de60 r6:8468f600 r5:84860000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff49fb0 to 0xdff49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846d4600 INFO: task kworker/0:93:3503 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: ba113000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:94:3505 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:94 state:D stack:0 pid:3505 tgid:3505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff55d84 r8:00000002 r7:60000013 r6:dff55d8c r5:84860c00 r4:84860c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84860c00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff55e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d4f40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84860c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff79000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84681b8c r4:84681800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84681b8c r4:8468f680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84860c00 r8:8468f6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f680 r8:8027ed34 r7:dff49e60 r6:8468f700 r5:84860c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff55fb0 to 0xdff55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846d46c0 INFO: task kworker/0:94:3505 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: ba542000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:95:3507 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:95 state:D stack:0 pid:3507 tgid:3507 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff5dd84 r8:00000002 r7:60000113 r6:dff5dd8c r5:84861800 r4:84861800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84861800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff5de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d4900 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84861800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff5f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84680f8c r4:84680c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84680f8c r4:8468f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84861800 r8:8468f7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f780 r8:8027ed34 r7:dff55e60 r6:8468f800 r5:84861800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff5dfb0 to 0xdff5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846d48c0 INFO: task kworker/0:95:3507 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: ba8d5000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:96:3509 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:96 state:D stack:0 pid:3509 tgid:3509 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff41d84 r8:00000002 r7:60000113 r6:dff41d8c r5:84863000 r4:84863000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84863000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff41e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d4a40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84863000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff65000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8468138c r4:84681000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8468138c r4:8468f880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84863000 r8:8468f8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f880 r8:8027ed34 r7:dff55e60 r6:8468f900 r5:84863000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff41fb0 to 0xdff41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846d4b80 INFO: task kworker/0:96:3509 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: ba8d5000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:97:3510 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:97 state:D stack:0 pid:3510 tgid:3510 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff7dd84 r8:00000002 r7:60000013 r6:dff7dd8c r5:84863c00 r4:84863c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84863c00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff7de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d4cc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84863c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff6f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8468178c r4:84681400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8468178c r4:8468fa00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84863c00 r8:8468fa2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8468fa00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468fa00 r8:8027ed34 r7:dff55e60 r6:8468fa80 r5:84863c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff7dfb0 to 0xdff7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846d4b80 INFO: task kworker/0:97:3510 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: baef7000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:98:3512 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:98 state:D stack:0 pid:3512 tgid:3512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff85d84 r8:00000002 r7:60000113 r6:dff85d8c r5:84862400 r4:84862400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84862400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff85e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8421d100 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84862400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df975000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84681f8c r4:84681c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84681f8c r4:8468f980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84862400 r8:8468f9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f980 r8:8027ed34 r7:dff55e60 r6:8468fb00 r5:84862400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff85fb0 to 0xdff85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846d48c0 INFO: task kworker/0:98:3512 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: baef7000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:99:3514 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:99 state:D stack:0 pid:3514 tgid:3514 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff89d84 r8:00000002 r7:60000113 r6:dff89d8c r5:84762400 r4:84762400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84762400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff89e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8421d600 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84762400 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa27000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8468278c r4:84682400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8468278c r4:8468fb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84762400 r8:8468fbac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468fb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468fb80 r8:8027ed34 r7:dff85e60 r6:848c5e00 r5:84762400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff89fb0 to 0xdff89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846d4ac0 INFO: task kworker/0:99:3514 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: bb607000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:107:3518 blocked for more than 452 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:107 state:D stack:0 pid:3518 tgid:3518 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff69d84 r8:00000002 r7:60000113 r6:dff69d8c r5:84763000 r4:84763000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84763000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff69e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8421d340 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84763000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ed000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8468238c r4:84682000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8468238c r4:848c5e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84763000 r8:848c5eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:848c5e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c5e80 r8:8027ed34 r7:dfed5e60 r6:848c5f00 r5:84763000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff69fb0 to 0xdff69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84691bc0 INFO: task kworker/1:107:3518 is blocked on a mutex likely owned by task kworker/0:83:3483. task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9bc00 r8:80200be4 r7:dfef9d54 r6:ffffffff r5:84a9bc00 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdfef9d20 to 0xdfef9d68) 9d20: bbbf0000 dfd63000 00000001 80239bb8 7f26d000 00000001 82abf1c4 82abe5a0 9d40: 7f26d000 dfd63000 8280c9b4 dfef9d9c dfef9da0 dfef9d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef9dc0 r5:dfef9e08 r4:dfef9dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8421d680 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfdd3000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:108:3521 blocked for more than 453 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:108 state:D stack:0 pid:3521 tgid:3521 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dff91d84 r8:00000002 r7:60000113 r6:dff91d8c r5:84765400 r4:84765400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84765400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff91e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8469d580 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84765400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfded000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:00001000 r4:dfdd3000 r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:848dceac r7:82804d40 r6:dddced40 r5:dddced60 r4:848dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848dce80 r8:8027ed34 r7:dfef1e60 r6:848c5a80 r5:84a9bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfef9fb0 to 0xdfef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:109:3525 blocked for more than 453 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:109 state:D stack:0 pid:3525 tgid:3525 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:dffa1d84 r8:00000002 r7:60000113 r6:dffa1d8c r5:84763c00 r4:84763c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84763c00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffa1e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848e9d40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84763c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e030b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847bf38c r4:847bf000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847bf38c r4:84670100 r4:84670100 Exception stack(0xdffa1fb0 to 0xdffa1ff8) task:kworker/0:83 state:R running task stack:0 pid:3483 tgid:3483 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82abf1e4 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474638c r4:84746000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474638c r4:848dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_sch <> [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff09dc0 r5:dff09e08 r4:dff09dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecdc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474678c r4:84746400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f000 r8:8027ed34 r7:dff01e60 r6:848c5b80 r5:84a9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff09fb0 to 0xdff09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:513:4740 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:513 state:D stack:0 pid:4740 tgid:4740 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb23dd84 r8:00000002 r7:60000013 r6:eb23dd8c r5:853d9800 r4:853d9800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853d9800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb23de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542e880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:853d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabb1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853afb8c r4:853af800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853afb8c r4:8541bf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d9800 r8:8541bf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8541bf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8541bf00 r8:8027ed34 r7:eb219e60 r6:85440600 r5:853d9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb23dfb0 to 0xeb23dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8542e5c0 INFO: task kworker/1:513:4740 is blocked on a mutex likely owned by task kworker/0:85:3487. task:kworker/0:85 state:R running task stack:0 pid:3487 tgid:3487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9e000 r8:80200be4 r7:dff09d54 r6:ffffffff r5:84a9e000 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff09d20 to 0xdff09d68) 9d20: d83df000 dfdc7000 00000001 80239bb8 7f26f000 00000001 82abf1c4 82abe5a0 9d40: 7f26f000 dfdc7000 8280c9b4 dff09d9c dff09da0 dff09d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff09dc0 r5:dff09e08 r4:dff09dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecdc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474678c r4:84746400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f000 r8:8027ed34 r7:dff01e60 r6:848c5b80 r5:84a9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff09fb0 to 0xdff09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:514:4741 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:514 state:D stack:0 pid:4741 tgid:4741 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb22dd84 r8:00000002 r7:60000013 r6:eb22dd8c r5:85308000 r4:85308000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85308000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb22de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542e6c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85308000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab85000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853af78c r4:853af400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853af78c r4:8541bf80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85308000 r8:8541bfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8541bf80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8541bf80 r8:8027ed34 r7:eb23de60 r6:85433f00 r5:85308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb22dfb0 to 0xeb22dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8542e5c0 INFO: task kworker/1:514:4741 is blocked on a mutex likely owned by task kworker/0:85:3487. task:kworker/0:85 state:R running task stack:0 pid:3487 tgid:3487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9e000 r8:80200be4 r7:dff09d54 r6:ffffffff r5:84a9e000 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff09d20 to 0xdff09d68) 9d20: d855e000 dfdc7000 00000001 80239bb8 7f26f000 00000001 82abf1c4 82abe5a0 9d40: 7f26f000 dfdc7000 8280c9b4 dff09d9c dff09da0 dff09d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff09dc0 r5:dff09e08 r4:dff09dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecdc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474678c r4:84746400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f000 r8:8027ed34 r7:dff01e60 r6:848c5b80 r5:84a9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff09fb0 to 0xdff09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:515:4744 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:515 state:D stack:0 pid:4744 tgid:4744 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb239d84 r8:00000002 r7:60000113 r6:eb239d8c r5:8530c800 r4:8530c800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8530c800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb239e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542f140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8530c800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaffb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b4f8c r4:853b4c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853b4f8c r4:85439000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530c800 r8:8543902c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85439000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85439000 r8:8027ed34 r7:eb23de60 r6:85439080 r5:8530c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb239fb0 to 0xeb239ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8542e840 INFO: task kworker/1:515:4744 is blocked on a mutex likely owned by task kworker/0:85:3487. task:kworker/0:85 state:R running task stack:0 pid:3487 tgid:3487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9e000 r8:80200be4 r7:dff09d54 r6:ffffffff r5:84a9e000 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff09d20 to 0xdff09d68) 9d20: d87fa000 dfdc7000 00000001 80239bb8 7f26f000 00000001 82abf1c4 82abe5a0 9d40: 7f26f000 dfdc7000 8280c9b4 dff09d9c dff09da0 dff09d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff09dc0 r5:dff09e08 r4:dff09dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecdc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474678c r4:84746400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f000 r8:8027ed34 r7:dff01e60 r6:848c5b80 r5:84a9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff09fb0 to 0xdff09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:516:4745 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:516 state:D stack:0 pid:4745 tgid:4745 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb235d84 r8:00000002 r7:60000113 r6:eb235d8c r5:8530d400 r4:8530d400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8530d400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb235e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542e900 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8530d400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaca3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853aff8c r4:853afc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853aff8c r4:85439100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530d400 r8:8543912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85439100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85439100 r8:8027ed34 r7:eb239e60 r6:85439180 r5:8530d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb235fb0 to 0xeb235ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8542e840 INFO: task kworker/1:516:4745 is blocked on a mutex likely owned by task kworker/0:85:3487. task:kworker/0:85 state:R running task stack:0 pid:3487 tgid:3487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:84a9e000 r8:80200be4 r7:dff09d54 r6:ffffffff r5:84a9e000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8530e000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb245e08 [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8530e000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead29000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b438c r4:853b4000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853b438c r4:85439200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530e000 r8:8543922c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85439200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85439200 r8:8027ed34 r7:eb239e60 r6:85439280 r5:8530e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb245fb0 to 0xeb245ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8542e940 INFO: task kworker/1:517:4747 is blocked on a mutex likely owned by task kworker/0:85:3487. task:kworker/0:85 state:R running task stack:0 pid:3487 tgid:3487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9e000 r8:80200be4 r7:dff09d54 r6:ffffffff r5:84a9e000 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff09d20 to 0xdff09d68) 9d20: d8cd6000 dfdc7000 00000001 80239bb8 7f26f000 00000001 82abf1c4 82abe5a0 9d40: 7f26f000 dfdc7000 8280c9b4 dff09d9c dff09da0 dff09d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff09dc0 r5:dff09e08 r4:dff09dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecdc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474678c r4:84746400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85480000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb255e08 r4:00000000 [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:85480000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8537078c r4:85439300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85480000 r8:8543932c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85439300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85439300 r8:8027ed34 r7:eb239e60 r6:85439380 r5:85480000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb255fb0 to 0xeb255ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8542ed80 INFO: task kworker/1:518:4751 is blocked on a mutex likely owned by task kworker/0:85:3487. task:kworker/0:85 state:R running task stack:0 pid:3487 tgid:3487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9e000 r8:80200be4 r7:dff09d54 r6:ffffffff r5:84a9e000 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff09d20 to 0xdff09d68) 9d20: d8cd6000 dfdc7000 00000001 80239bb8 7f26f000 00000001 82abf1c4 82abe5a0 9d40: 7f26f000 dfdc7000 8280c9b4 dff09d9c dff09da0 dff09d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff09dc0 r5:dff09e08 r4:dff09dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecdc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474678c r4:84746400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f000 r8:8027ed34 r7:dff01e60 r6:848c5b80 r5:84a9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:297 state:D stack:0 pid:4752 tgid:4752 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb259e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85442040 r5:844bc78c r4:844bc400 r4:85440680 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8467bb80 INFO: task kworker/0:297:4752 is blocked on a mutex likely owned by task kworker/0:85:3487. task:kworker/0:85 state:R running task stack:0 pid:3487 tgid:3487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9e000 r8:80200be4 r7:dff09d54 r6:ffffffff r5:84a9e000 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff09d20 to 0xdff09d68) 9d20: d942f000 dfdc7000 00000001 80239bb8 7f26f000 00000001 82abf1c4 82abe5a0 9d40: 7f26f000 dfdc7000 8280c9b4 dff09d9c dff09da0 dff09d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff09dc0 r5:dff09e08 r4:dff09dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecdc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474678c r4:84746400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f000 r8:8027ed34 r7:dff01e60 r6:848c5b80 r5:84a9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff09fb0 to 0xdff09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:298:4753 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:298 state:D stack:0 pid:4753 tgid:4753 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb261d84 r8:00000002 r7:60000113 r6:eb261d8c r5:85482400 r4:85482400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb261e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85482400 r8:8544072c r7:82804d40 r6:dddced40 r5:dddced60 1fa0: 00000000 00000000 00000000 00000000 r4:85442080 Workqueue: events bpf_prog_free_deferred 9d20: d972d000 dfdc7000 00000001 80239bb8 7f26f000 00000001 82abf1c4 82abe5a0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff09dc0 r5:dff09e08 r4:dff09dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecdc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474678c r4:84746400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f000 r8:8027ed34 r7:dff01e60 r6:848c5b80 r5:84a9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff09fb0 to 0xdff09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:299:4755 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:299 state:D stack:0 pid:4755 tgid:4755 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb265d84 r8:00000002 r7:60000113 r6:eb265d8c r5:85483000 r4:85483000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85483000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb265e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85442200 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85483000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaed1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537038c r4:85370000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8537038c r4:85440780 r10:00000000 r9:85440780 r8:8027ed34 r7:eb261e60 r6:85439500 r5:85483000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:85 state:R running task stack:0 pid:3487 tgid:3487 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80000013 ffffffff [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff09dc0 r5:dff09e08 r4:dff09dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecdc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474678c r4:84746400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f000 r8:8027ed34 r7:dff01e60 r6:848c5b80 r5:84a9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff09fb0 to 0xdff09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:300:4756 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:300 state:D stack:0 pid:4756 tgid:4756 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb269d84 r8:00000002 r7:60000113 r6:eb269d8c r5:85483c00 r4:85483c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85483c00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb269e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85442580 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85483c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf2b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85370b8c r4:85370800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85370b8c r4:85440800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85483c00 r8:8544082c r7:82804d40 r6:dddced40 r5:dddced60 r4:85440800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85440800 r8:8027ed34 r7:eb261e60 r6:85440880 r5:85483c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb269fb0 to 0xeb269ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854421c0 INFO: task kworker/0:300:4756 is blocked on a mutex likely owned by task kworker/0:85:3487. task:kworker/0:85 state:R running task stack:0 pid:3487 tgid:3487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9e000 r8:80200be4 r7:dff09d54 r6:ffffffff r5:84a9e000 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff09d20 to 0xdff09d68) 9d20: d9dd1000 dfdc7000 00000001 80239bb8 7f26f000 00000001 82abf1c4 82abe5a0 9d40: 7f26f000 dfdc7000 8280c9b4 dff09d9c dff09da0 dff09d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff09dc0 r5:dff09e08 r4:dff09dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecdc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474678c r4:84746400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f000 r8:8027ed34 r7:dff01e60 r6:848c5b80 r5:84a9e000 Exception stack(0xdff09fb0 to 0xdff09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:519:4759 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:519 state:D stack:0 pid:4759 tgid:4759 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb249d84 r8:00000002 r7:60000113 r6:eb249d8c r5:84a40000 r4:84a40000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a40000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb249e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542ed80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a40000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf35000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b478c r4:853b4400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853b478c r4:85439580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a40000 r8:854395ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85439580 r10:00000000 r9:85439580 r8:8027ed34 r7:eb239e60 r6:85440900 r5:84a40000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 9d60: 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff09dc0 r5:dff09e08 r9:83018005 r8:84a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:520:4763 blocked for more than 474 seconds. Call trace: [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb279e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542f000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:853e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf5b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b4b8c r4:853b4800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853b4b8c r4:85439600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e8000 r8:8543962c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85439600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85439600 r8:8027ed34 r7:eb239e60 r6:85440980 r5:853e8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb279fb0 to 0xeb279ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8542f1c0 INFO: task kworker/1:520:4763 is blocked on a mutex likely owned by task kworker/0:85:3487. task:kworker/0:85 state:R running task stack:0 pid:3487 tgid:3487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9e000 r8:80200be4 r7:dff09d54 r6:ffffffff r5:84a9e000 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff09d20 to 0xdff09d68) 9d20: da2f8000 dfdc7000 00000001 80239bb8 7f26f000 00000001 82abf1c4 82abe5a0 9d40: 7f26f000 dfdc7000 8280c9b4 dff09d9c dff09da0 dff09d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:dff09dc0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xdff09fb0 to 0xdff09ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:521:4764 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:521 state:D stack:0 pid:4764 tgid:4764 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb27dd84 r8:00000002 r7:60000113 r6:eb27dd8c r5:853e8c00 r4:853e8c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853e8c00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb27de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542f300 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:853e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb005000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b538c r4:853b5000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853b538c r4:85439680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e8c00 r8:854396ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85439680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85439680 r8:8027ed34 r7:eb239e60 r6:85440a00 r5:853e8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb27dfb0 to 0xeb27dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8542f2c0 INFO: task kworker/1:521:4764 is blocked on a mutex likely owned by task kworker/0:85:3487. task:kworker/0:85 state:R running task stack:0 pid:3487 tgid:3487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9e000 r8:80200be4 r7:dff09d54 r6:ffffffff r5:84a9e000 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff09d20 to 0xdff09d68) 9d20: da5f3000 dfdc7000 00000001 80239bb8 7f26f000 00000001 82abf1c4 82abe5a0 9d40: 7f26f000 dfdc7000 8280c9b4 dff09d9c dff09da0 dff09d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff09dc0 r5:dff09e08 r4:dff09dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecdc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474678c r4:84746400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f000 r8:8027ed34 r7:dff01e60 r6:848c5b80 r5:84a9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff09fb0 to 0xdff09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:522:4766 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:522 state:D stack:0 pid:4766 tgid:4766 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb285d84 r8:00000002 r7:60000113 r6:eb285d8c r5:853ea400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb285e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542f440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:853ea400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb013000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b578c r4:853b5400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853b578c r4:85439700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ea400 r8:8543972c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85439700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85439700 r8:8027ed34 r7:eb27de60 r6:85440a80 r5:853ea400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb285fb0 to 0xeb285ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8542f080 INFO: task kworker/1:522:4766 is blocked on a mutex likely owned by task kworker/0:85:3487. task:kworker/0:85 state:R running task stack:0 pid:3487 tgid:3487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9e000 r8:80200be4 r7:dff09d54 r6:ffffffff r5:84a9e000 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff09d20 to 0xdff09d68) 9d20: da68a000 dfdc7000 00000001 80239bb8 7f26f000 00000001 82abf1c4 82abe5a0 9d40: 7f26f000 dfdc7000 8280c9b4 dff09d9c dff09da0 dff09d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff09dc0 r5:dff09e08 r4:dff09dc0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:523 state:D stack:0 pid:4768 tgid:4768 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb28dd84 r8:00000002 r7:60000013 r6:eb28dd8c r5:853e9800 r4:853e9800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853e9800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb28de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542f7c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:853e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03f3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b638c r4:853b6000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853b638c r4:85439780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e9800 r8:854397ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85439780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85439780 r8:8027ed34 r7:eb285e60 r6:85440b00 r5:853e9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8542f240 INFO: task kworker/1:523:4768 is blocked on a mutex likely owned by task kworker/0:85:3487. task:kworker/0:85 state:R running task stack:0 pid:3487 tgid:3487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:84a9e000 r8:80200be4 r7:dff09d54 r6:ffffffff r5:84a9e000 r5:80000013 r4:80239bd0 r4:dff09dc0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f000 r8:8027ed34 r7:dff01e60 r6:848c5b80 r5:84a9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff09fb0 to 0xdff09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:524:4770 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:524 state:D stack:0 pid:4770 tgid:4770 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb295d84 r8:00000002 r7:60000113 r6:eb295d8c r5:853eb000 r4:853eb000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853eb000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb295e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542f580 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:853eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f013000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa45000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b5b8c r4:853b5800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853b5b8c r4:85439800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853eb000 r8:8543982c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:524:4770 is blocked on a mutex likely owned by task kworker/0:85:3487. r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff09d20 to 0xdff09d68) 9d20: dad79000 dfdc7000 00000001 80239bb8 7f26f000 00000001 82abf1c4 82abe5a0 9d40: 7f26f000 dfdc7000 8280c9b4 dff09d9c dff09da0 dff09d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff09dc0 r5:dff09e08 r4:dff09dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecdc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474678c r4:84746400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:525:4772 blocked for more than 474 seconds. Call trace: [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb26de08 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542f740 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85439880 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:525:4772 is blocked on a mutex likely owned by task kworker/0:85:3487. Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9e000 r8:80200be4 r7:dff09d54 r6:ffffffff r5:84a9e000 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff09d20 to 0xdff09d68) 9d20: db080000 dfdc7000 00000001 80239bb8 7f26f000 00000001 82abf1c4 82abe5a0 9d40: 7f26f000 dfdc7000 8280c9b4 dff09d9c dff09da0 dff09d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff09dc0 r5:dff09e08 r4:dff09dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecdc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474678c r4:84746400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f000 r8:8027ed34 r7:dff01e60 r6:848c5b80 r5:84a9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff09fb0 to 0xdff09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:526:4775 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb131d84 r8:00000002 r7:60000113 r6:eb131d8c r5:85485400 r4:85485400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85485400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb131e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542fcc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85485400 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea991000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b6f8c r4:853b6c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853b6f8c r4:85439980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85485400 r8:854399ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85439980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85439980 r8:8027ed34 r7:eb28de60 r6:85439a00 r5:85485400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:85 state:R running task stack:0 pid:3487 tgid:3487 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bd0 r4:dff09dc0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb24de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542fa00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85486000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05c7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b678c r4:853b6400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853b678c r4:85439a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85486000 r8:85439aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85439a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85439a80 r8:8027ed34 r7:eb131e60 r6:85439b00 r5:85486000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb24dfb0 to 0xeb24dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8542f800 INFO: task kworker/1:527:4776 is blocked on a mutex likely owned by task kworker/0:85:3487. task:kworker/0:85 state:R running task stack:0 pid:3487 tgid:3487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9e000 r8:80200be4 r7:dff09d54 r6:ffffffff r5:84a9e000 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff09d20 to 0xdff09d68) 9d20: db9ce000 dfdc7000 00000001 80239bb8 7f26f000 00000001 82abf1c4 82abe5a0 9d40: 7f26f000 dfdc7000 8280c9b4 dff09d9c dff09da0 dff09d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:dff09dc0 r4:00000000 r5:00001000 r4:dfde5000 r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 r4:00000001 Exception stack(0xdff09fb0 to 0xdff09ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:528:4778 blocked for more than 474 seconds. Call trace: r5:85486c00 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb29de08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:ea805000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85486c00 r8:85439bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85439b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85439b80 r8:8027ed34 r7:eb131e60 r6:85439c00 r5:85486c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb29dfb0 to 0xeb29dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8542f9c0 INFO: task kworker/1:528:4778 is blocked on a mutex likely owned by task kworker/0:85:3487. task:kworker/0:85 state:R running task stack:0 pid:3487 tgid:3487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9e000 r8:80200be4 r7:dff09d54 r6:ffffffff r5:84a9e000 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff09d20 to 0xdff09d68) 9d20: dbc2b000 dfdc7000 00000001 80239bb8 7f26f000 00000001 82abf1c4 82abe5a0 9d40: 7f26f000 dfdc7000 8280c9b4 dff09d9c dff09da0 dff09d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff09dc0 r5:dff09e08 r4:dff09dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecdc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474678c r4:84746400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f000 r8:8027ed34 r7:dff01e60 r6:848c5b80 r5:84a9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff09fb0 to 0xdff09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:529:4781 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:529 state:D stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2add84 r8:00000002 r7:60000013 r6:eb2add8c r5:853ebc00 r4:853ebc00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853ebc00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ade08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542ff40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:853ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa67000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b778c r4:853b7400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853b778c r4:85439c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ebc00 r8:85439cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85439c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85439c80 r8:8027ed34 r7:eb131e60 r6:85440c00 r5:853ebc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2adfb0 to 0xeb2adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8542fc00 INFO: task kworker/1:529:4781 is blocked on a mutex likely owned by task kworker/0:85:3487. task:kworker/0:85 state:R running task stack:0 pid:3487 tgid:3487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9e000 r8:80200be4 r7:dff09d54 r6:ffffffff r5:84a9e000 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff09d20 to 0xdff09d68) 9d20: dbd62000 dfdc7000 00000001 80239bb8 7f26f000 00000001 82abf1c4 82abe5a0 9d40: 7f26f000 dfdc7000 8280c9b4 dff09d9c dff09da0 dff09d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff09dc0 r5:dff09e08 r4:dff09dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecdc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474678c r4:84746400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:530:4782 blocked for more than 474 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2b1d84 r8:00000002 r7:60000013 r6:eb2b1d8c r5:853ed400 r4:853ed400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853ed400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b1e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542fd40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:853ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9d1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b738c r4:853b7000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853b738c r4:85439d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ed400 r8:85439d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85439d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85439d00 r8:8027ed34 r7:eb2ade60 r6:85440c80 r5:853ed400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b1fb0 to 0xeb2b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8542fec0 INFO: task kworker/1:530:4782 is blocked on a mutex likely owned by task kworker/0:85:3487. task:kworker/0:85 state:R running task stack:0 pid:3487 tgid:3487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9e000 r8:80200be4 r7:dff09d54 r6:ffffffff r5:84a9e000 r4:00000000 9d20: dbe98000 dfdc7000 00000001 80239bb8 7f26f000 00000001 82abf1c4 82abe5a0 r4:dff09dc0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:531:4784 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:531 state:D stack:0 pid:4784 tgid:4784 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2b9d84 r8:00000002 r7:60000113 r6:eb2b9d8c r5:853eec00 r4:853eec00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853eec00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b9e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85454000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:853eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabf9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b7b8c r4:853b7800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853b7b8c r4:85439d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853eec00 r8:85439dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85439d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85439d80 r8:8027ed34 r7:eb2ade60 r6:85440d00 r5:853eec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b9fb0 to 0xeb2b9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d20: dc0d6000 dfdc7000 00000001 80239bb8 7f26f000 00000001 82abf1c4 82abe5a0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018005 r8:84a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474678c r4:84746400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f000 r8:8027ed34 r7:dff01e60 r6:848c5b80 r5:84a9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff09fb0 to 0xdff09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:532:4786 blocked for more than 474 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:532 state:D stack:0 pid:4786 tgid:4786 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2a1d84 r8:00000002 r7:60000013 r6:eb2a1d8c r5:85484800 r4:85484800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85484800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a1e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854543c0 r5:00001000 r4:ead73000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853c038c r4:853c0000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853c038c r4:85439e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85484800 r8:85439e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85439e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85439e00 r8:8027ed34 r7:eb2b9e60 r6:85439e80 r5:85484800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a1fb0 to 0xeb2a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85454100 INFO: task kworker/1:532:4786 is blocked on a mutex likely owned by task kworker/0:85:3487. task:kworker/0:85 state:R running task stack:0 pid:3487 tgid:3487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9e000 r8:80200be4 r7:dff09d54 r6:ffffffff r5:84a9e000 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff09d20 to 0xdff09d68) 9d20: dc53f000 dfdc7000 00000001 80239bb8 7f26f000 00000001 82abf1c4 82abe5a0 r4:82abf1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecdc0 r5:00001000 r4:dfde5000 r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xdff09fb0 to 0xdff09ff8) r4:846ecec0 task:kworker/1:533 state:D stack:0 pid:4789 tgid:4789 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c1e08 r4:00000000 [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8530a400 r8:85433fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:85433f80 r8:8027ed34 r7:eb2a1e60 r6:85439f00 r5:8530a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c1fb0 to 0xeb2c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854542c0 INFO: task kworker/1:533:4789 is blocked on a mutex likely owned by task kworker/0:85:3487. task:kworker/0:85 state:R running task stack:0 pid:3487 tgid:3487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9e000 r8:80200be4 r7:dff09d54 r6:ffffffff r5:84a9e000 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff09d20 to 0xdff09d68) 9d20: dc803000 dfdc7000 00000001 80239bb8 7f26f000 00000001 82abf1c4 82abe5a0 9d40: 7f26f000 dfdc7000 8280c9b4 dff09d9c dff09da0 dff09d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff09dc0 r5:dff09e08 r4:dff09dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecdc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474678c r4:84746400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f000 r8:8027ed34 r7:dff01e60 r6:848c5b80 r5:84a9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff09fb0 to 0xdff09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:534:4790 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:534 state:D stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2a5d84 r8:00000002 r7:60000013 r6:eb2a5d8c r5:8530ec00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a5e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eadcb000 r7:ddde2d40 r6:83018200 r5:853c0b8c r4:85439f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530ec00 r8:85439fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85439f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85439f80 r8:8027ed34 r7:eb2a1e60 r6:85457000 r5:8530ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a5fb0 to 0xeb2a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85454180 INFO: task kworker/1:534:4790 is blocked on a mutex likely owned by task kworker/0:85:3487. task:kworker/0:85 state:R running task stack:0 pid:3487 tgid:3487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9e000 r8:80200be4 r7:dff09d54 r6:ffffffff r5:84a9e000 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff09d20 to 0xdff09d68) 9d20: dcbe5000 dfdc7000 00000001 80239bb8 7f26f000 00000001 82abf1c4 82abe5a0 9d40: 7f26f000 dfdc7000 8280c9b4 dff09d9c dff09da0 dff09d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff09dc0 r5:dff09e08 r4:dff09dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecdc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474678c r4:84746400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f000 r8:8027ed34 r7:dff01e60 r6:848c5b80 r5:84a9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff09fb0 to 0xdff09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:535:4793 blocked for more than 475 seconds. task:kworker/1:535 state:D stack:0 pid:4793 tgid:4793 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c5e08 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eada5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853c078c r4:853c0400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853c078c r4:85457080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e0000 r8:854570ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85457080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85457080 r8:8027ed34 r7:eb2a5e60 r6:85457100 r5:853e0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c5fb0 to 0xeb2c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85454440 INFO: task kworker/1:535:4793 is blocked on a mutex likely owned by task kworker/0:85:3487. task:kworker/0:85 state:R running task stack:0 pid:3487 tgid:3487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9e000 r8:80200be4 r7:dff09d54 r6:ffffffff r5:84a9e000 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff09d20 to 0xdff09d68) 9d20: dd05d000 dfdc7000 00000001 80239bb8 7f26f000 00000001 82abf1c4 82abe5a0 9d40: 7f26f000 dfdc7000 8280c9b4 dff09d9c dff09da0 dff09d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff09dc0 r5:dff09e08 r4:dff09dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecdc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:536:4794 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:536 state:D stack:0 pid:4794 tgid:4794 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2c9d84 r8:00000002 r7:60000113 r6:eb2c9d8c r5:853e0c00 r4:853e0c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853e0c00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c9e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85454b80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:853e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:536:4794 is blocked on a mutex likely owned by task kworker/0:85:3487. Exception stack(0xdff09d20 to 0xdff09d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff09dc0 r5:dff09e08 r5:00001000 r4:dfde5000 r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 Exception stack(0xdff09fb0 to 0xdff09ff8) INFO: task kworker/1:537:4796 blocked for more than 475 seconds. Call trace: r4:853e2400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853e2400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d1e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85454840 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:853e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaded000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853c0f8c r4:853c0c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853c0f8c r4:85457300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e2400 r8:8545732c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85457300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85457300 r8:8027ed34 r7:eb2c9e60 r6:85457380 r5:853e2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d1fb0 to 0xeb2d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85454900 INFO: task kworker/1:537:4796 is blocked on a mutex likely owned by task kworker/0:85:3487. task:kworker/0:85 state:R running task stack:0 pid:3487 tgid:3487 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:84a9e000 r8:80200be4 r7:dff09d54 r6:ffffffff r5:84a9e000 r4:dff09dc0 r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:538 state:D stack:0 pid:4798 tgid:4798 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2cdd84 r8:00000002 r7:60000013 r6:eb2cdd8c r5:853e3000 r4:853e3000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853e3000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2cde08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85454800 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:853e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae4b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853c138c r4:853c1000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853c138c r4:85457280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e3000 r8:854572ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f26f000 dfdc7000 8280c9b4 dff09d9c dff09da0 dff09d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dfde5000 r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:539:4801 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:539 state:D stack:0 pid:4801 tgid:4801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2d9d84 r8:00000002 r7:60000013 r6:eb2d9d8c r5:853e3c00 r4:853e3c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853e3c00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d9e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854619c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:853e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0b3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853c2f8c r4:853c2c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853c2f8c r4:85457480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e3c00 r8:854574ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85457480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85457480 r8:8027ed34 r7:eb2c9e60 r6:85457500 r5:853e3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bd0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8474678c r4:84746400 r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f000 r8:8027ed34 r7:dff01e60 r6:848c5b80 r5:84a9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff09fb0 to 0xdff09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:540:4802 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:540 state:D stack:0 pid:4802 tgid:4802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2d5d84 r8:00000002 r7:60000113 r6:eb2d5d8c r5:853e5400 r4:853e5400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853e5400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d5e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85454d00 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85457580 r8:8027ed34 r7:eb2d9e60 r6:85457600 r5:853e5400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r5:80000013 r4:80239bd0 r4:00000000 r9:83018005 r8:84a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474678c r4:84746400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f000 r8:8027ed34 r7:dff01e60 r6:848c5b80 r5:84a9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff09fb0 to 0xdff09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:541:4804 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:541 state:D stack:0 pid:4804 tgid:4804 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2e1d84 r8:00000002 r7:60000013 r6:eb2e1d8c r5:853e6000 r4:853e6000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:853c278c r4:853c2400 r10:00000000 r9:85457680 r8:8027ed34 r7:eb2d9e60 r6:85457700 r5:853e6000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:85 state:R running task stack:0 pid:3487 tgid:3487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9e000 r8:80200be4 r7:dff09d54 r6:ffffffff r5:84a9e000 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff09d20 to 0xdff09d68) 9d20: dea92000 dfdc7000 00000001 80239bb8 7f26f000 00000001 82abf1c4 82abe5a0 9d40: 7f26f000 dfdc7000 8280c9b4 dff09d9c dff09da0 dff09d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff09dc0 r5:dff09e08 r4:dff09dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecdc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474678c r4:84746400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:301 state:D stack:0 pid:4807 tgid:4807 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853e1800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ede08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85466200 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r5:00001000 r4:eb03b000 r7:dddced40 r6:83018000 r5:8537138c r4:85440d80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:84a9e000 r8:80200be4 r7:dff09d54 r6:ffffffff r5:84a9e000 r4:82abf1e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecdc0 r5:8474678c r4:84746400 r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f000 r8:8027ed34 r7:dff01e60 r6:848c5b80 r5:84a9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff09fb0 to 0xdff09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:302:4809 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:302 state:D stack:0 pid:4809 tgid:4809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2f5d84 r8:00000002 r7:60000113 r6:eb2f5d8c r5:85488000 r4:85488000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85488000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f5e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85466500 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:85488000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb087000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85371b8c r4:85371800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85371b8c r4:85440e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85488000 r8:85440e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85440e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85440e00 r8:8027ed34 r7:eb2ede60 r6:85457800 r5:85488000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f5fb0 to 0xeb2f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85466140 INFO: task kworker/0:302:4809 is blocked on a mutex likely owned by task kworker/0:85:3487. task:kworker/0:85 state:R running task stack:0 pid:3487 tgid:3487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9e000 r8:80200be4 r7:dff09d54 r6:ffffffff r5:84a9e000 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff09d20 to 0xdff09d68) 9d20: df055000 dfdc7000 00000001 80239bb8 7f26f000 00000001 82abf1c4 82abe5a0 9d40: 7f26f000 dfdc7000 8280c9b4 dff09d9c dff09da0 dff09d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 r5:00001000 r4:dfde5000 r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:846ecec0 task:kworker/0:303 state:D stack:0 pid:4810 tgid:4810 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f9e08 r4:00000000 [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85440e80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85466140 INFO: task kworker/0:303:4810 is blocked on a mutex likely owned by task kworker/0:85:3487. task:kworker/0:85 state:R running task stack:0 pid:3487 tgid:3487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9e000 r8:80200be4 r7:dff09d54 r6:ffffffff r5:84a9e000 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff09d20 to 0xdff09d68) 9d20: df055000 dfdc7000 00000001 80239bb8 7f26f000 00000001 82abf1c4 82abe5a0 9d40: 7f26f000 dfdc7000 8280c9b4 dff09d9c dff09da0 dff09d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff09dc0 r5:dff09e08 r4:dff09dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecdc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474678c r4:84746400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f000 r8:8027ed34 r7:dff01e60 r6:848c5b80 r5:84a9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff09fb0 to 0xdff09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:846ecec0 task:kworker/0:304 state:D stack:0 pid:4812 tgid:4812 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85440f00 r8:8027ed34 r7:eb2f5e60 r6:85457900 r5:8548a400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9e000 r8:80200be4 r7:dff09d54 r6:ffffffff r5:84a9e000 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff09d20 to 0xdff09d68) 9d20: df63c000 dfdc7000 00000001 80239bb8 7f26f000 00000001 82abf1c4 82abe5a0 9d40: 7f26f000 dfdc7000 8280c9b4 dff09d9c dff09da0 dff09d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff09dc0 r5:dff09e08 r4:dff09dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecdc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474678c r4:84746400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f000 r8:8027ed34 r7:dff01e60 r6:848c5b80 r5:84a9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff09fb0 to 0xdff09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:542:4814 blocked for more than 475 seconds. Call trace: [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:85 state:R running task stack:0 pid:3487 tgid:3487 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:84a9e000 r8:80200be4 r7:dff09d54 r6:ffffffff r5:84a9e000 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff09d20 to 0xdff09d68) 9d20: df63c000 dfdc7000 00000001 80239bb8 7f26f000 00000001 82abf1c4 82abe5a0 9d40: 7f26f000 dfdc7000 8280c9b4 dff09d9c dff09da0 dff09d70 80230af4 80239bd0 9d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff09dc0 r5:dff09e08 r4:dff09dc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecdc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474678c r4:84746400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474678c r4:8468f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9e000 r8:8468f02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f000 r8:8027ed34 r7:dff01e60 r6:848c5b80 r5:84a9e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff09fb0 to 0xdff09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:305:4816 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:305 state:D stack:0 pid:4816 tgid:4816 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb30dd84 r8:00000002 r7:60000113 r6:eb30dd8c r5:8548d400 r4:8548d400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8548d400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb30de08 [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8548d400 r8:8546002c r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:306:4818 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:306 state:D stack:0 pid:4818 tgid:4818 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb2ddd84 r8:00000002 r7:60000113 r6:eb2ddd8c r5:853ee000 r4:853ee000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853ee000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2dde08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r10:61c88647 r9:853ee000 r8:854600ac r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: 7f893000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:543:4821 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:543 state:D stack:0 pid:4821 tgid:4821 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb315d84 r8:00000002 r7:60000113 r6:eb315d8c r5:853ec800 r4:853ec800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853ec800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb315e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854547c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:853ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85457b00 r8:8027ed34 r7:eb2d9e60 r6:85460180 r5:853ec800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:82abf1e4 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:544:4823 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:544 state:D stack:0 pid:4823 tgid:4823 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb31dd84 r8:00000002 r7:60000113 r6:eb31dd8c r5:84a60000 r4:84a60000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a60000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb31de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461c00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a60000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0ed000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853c338c r4:853c3000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853c338c r4:85457b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a60000 r8:85457bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85457b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85457b80 r8:8027ed34 r7:eb315e60 r6:85460200 r5:84a60000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: 7fa93000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:545:4824 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:545 state:D stack:0 pid:4824 tgid:4824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb321d84 r8:00000002 r7:60000113 r6:eb321d8c r5:84a60c00 r4:84a60c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a60c00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb321e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461d80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a60c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0fd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853c378c r4:853c3400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853c378c r4:85457c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a60c00 r8:85457c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85457c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85457c00 r8:8027ed34 r7:eb315e60 r6:85460280 r5:84a60c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb321fb0 to 0xeb321ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85461ac0 INFO: task kworker/1:545:4824 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 7fc96000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84a62400 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb329e08 r4:00000000 [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 r5:00001000 r4:eb10f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853c3b8c r4:853c3800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853c3b8c r4:85457e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a62400 r8:85457e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85457e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85457e00 r8:8027ed34 r7:eb315e60 r6:85460300 r5:84a62400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb329fb0 to 0xeb329ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85461fc0 INFO: task kworker/1:546:4826 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 7ffc1000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 90000013 ffffffff r5:90000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:547:4828 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r10:829185c4 r9:eb331d84 r8:00000002 r7:60000113 r6:eb331d8c r5:84a61800 r4:84a61800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a61800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb331e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854617c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a61800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb11b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853c3f8c r4:853c3c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853c3f8c r4:85457c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a61800 r8:85457cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85457c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85457c80 r8:8027ed34 r7:eb315e60 r6:85460380 r5:84a61800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb331fb0 to 0xeb331ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85461e00 Call trace: dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.16.0-rc2-syzkaller #0 Call trace: [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb339e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85465400 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a63000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe73000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b978c r4:854b9400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854b978c r4:85457d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a63000 r8:85457d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85457d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85457d00 r8:8027ed34 r7:eb315e60 r6:85460400 r5:84a63000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb339fb0 to 0xeb339ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:549 state:D stack:0 pid:4832 tgid:4832 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb341e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85465000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a63c00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1b1000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b878c r4:854b8400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854b878c r4:85457d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a63c00 r8:85457dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85457d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85457d80 r8:8027ed34 r7:eb339e60 r6:85460480 r5:84a63c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb341fb0 to 0xeb341ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85461740 INFO: task kworker/1:549:4832 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 80626000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r4:8468f080 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:307 state:D stack:0 pid:4834 tgid:4834 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb33dd84 r8:00000002 r7:60000113 r6:eb33dd8c r5:84a65400 r4:84a65400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a65400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb33de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854712c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a65400 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa95000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537278c r4:85372400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8537278c r4:85460500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a65400 r8:8546052c r7:82804d40 r6:dddced40 r5:dddced60 r4:85460500 Exception stack(0xeb33dfb0 to 0xeb33dff8) Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:550:4837 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:550 state:D stack:0 pid:4837 tgid:4837 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb271d84 r8:00000002 r7:60000013 r6:eb271d8c r5:84a66000 r4:84a66000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a66000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb271e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85465140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a66000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r7:ddde2d40 r6:83018200 r5:854b8f8c r4:85467000 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 r4:00000000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:551:4838 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:551 state:D stack:0 pid:4838 tgid:4838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb361d84 r8:00000002 r7:60000113 r6:eb361d8c r5:84a64800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb361e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854652c0 r5:854b938c r4:854b9000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854b938c r4:85467080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a64800 r8:854670ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85467080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85467080 r8:8027ed34 r7:eb339e60 r6:85460680 r5:84a64800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb361fb0 to 0xeb361ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85465080 INFO: task kworker/1:551:4838 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84746b8c r4:84746800 Exception stack(0xdff0dfb0 to 0xdff0dff8) Not tainted 6.16.0-rc2-syzkaller #0 [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85465340 INFO: task kworker/1:552:4841 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 8100e000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829185c4 r9:eb36dd84 r8:00000002 r7:60000013 r6:eb36dd8c r5:853dec00 r4:00000000 r9:83018205 r8:853dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) INFO: task kworker/1:554:4845 blocked for more than 475 seconds. r5:853f8000 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb309e08 r4:00000000 r7:ddde2d40 r6:83018200 r5:854ba38c r4:85467200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 r5:84746b8c r4:84746800 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:555:4846 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:555 state:D stack:0 pid:4846 tgid:4846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb371d84 r8:00000002 r7:60000113 r6:eb371d8c r5:853f8c00 r4:853f8c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853f8c00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb371e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85465a40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:853f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaba7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ba78c r4:854ba400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854ba78c r4:85467280 r10:00000000 r9:85467280 r8:8027ed34 r7:eb309e60 r6:85460880 r5:853f8c00 task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 81776000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:308 state:D stack:0 pid:4849 tgid:4849 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb35de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8554fc40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:853f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae63000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85373f8c r4:85373c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85373f8c r4:85460900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f9800 r8:8546092c r7:82804d40 r6:dddced40 r5:dddced60 r4:85460900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85460900 r8:8027ed34 r7:eb30de60 r6:85460980 r5:853f9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb35dfb0 to 0xeb35dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85471380 INFO: task kworker/0:308:4849 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:556:4852 blocked for more than 475 seconds. Not tainted 6.16.0-rc2-syzkaller #0 task:kworker/1:556 state:D stack:0 pid:4852 tgid:4852 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb379e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:854bc78c r4:854bc400 r4:85467380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 81c6a000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 Exception stack(0xdff0dfb0 to 0xdff0dff8) INFO: task kworker/1:557:4855 blocked for more than 476 seconds. r10:829185c4 r9:eb385d84 r8:00000002 r7:60000113 r6:eb385d8c r5:853fbc00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb385e08 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r10:61c88647 r9:853fbc00 r8:8546732c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:558:4856 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:558 state:D stack:0 pid:4856 tgid:4856 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb389d84 r8:00000002 r7:60000013 r6:eb389d8c r5:853fd400 r4:853fd400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb389e08 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd60: 80000013 ffffffff r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:559:4858 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:559 state:D stack:0 pid:4858 tgid:4858 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb391d84 r8:00000002 r7:60000013 r6:eb391d8c r5:853fc800 r4:853fc800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853fc800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb391e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85465e80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:853fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeb7000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bb38c r4:854bb000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bb38c r4:85467480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fc800 r8:854674ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85467480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85467480 r8:8027ed34 r7:eb379e60 r6:85460b80 r5:853fc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb391fb0 to 0xeb391ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85465e00 INFO: task kworker/1:559:4858 is blocked on a mutex likely owned by task kworker/0:86:3488. Exception stack(0xdff0dd20 to 0xdff0dd68) r4:dff0ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:309:4860 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:309 state:D stack:0 pid:4860 tgid:4860 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb399d84 r8:00000002 r7:60000113 r6:eb399d8c r5:853fe000 r4:853fe000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853fe000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb399e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552eb80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r5:85372f8c r4:85372c00 r4:85460c00 Exception stack(0xeb399fb0 to 0xeb399ff8) task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82abf1e4 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8468f080 dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:560:4861 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:560 state:D stack:0 pid:4861 tgid:4861 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb39dd84 r8:00000002 r7:60000013 r6:eb39dd8c r5:853fa400 r4:853fa400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853fa400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb39de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85465f00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:853fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaecf000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bb78c r4:854bb400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bb78c r4:85467500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fa400 r8:8546752c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85467500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85467500 r8:8027ed34 r7:eb379e60 r6:85460d00 r5:853fa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb39dfb0 to 0xeb39dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85465e40 INFO: task kworker/1:560:4861 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 823fc000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:561:4863 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:561 state:D stack:0 pid:4863 tgid:4863 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb3a1d84 r8:00000002 r7:60000013 r6:eb3a1d8c r5:853fec00 r4:853fec00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853fec00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a1e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85466700 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:853fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf1d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85467580 Exception stack(0xeb3a1fb0 to 0xeb3a1ff8) r4:85466e40 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 826d4000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:562 state:D stack:0 pid:4865 tgid:4865 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a5e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85473040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a58000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf2f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bbf8c r4:854bbc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bbf8c r4:85467600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a58000 r8:8546762c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85467600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85467600 r8:8027ed34 r7:eb379e60 r6:85460e00 r5:84a58000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3a5fb0 to 0xeb3a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85465780 INFO: task kworker/1:562:4865 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 82973000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:563:4867 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:563 state:D stack:0 pid:4867 tgid:4867 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb3add84 r8:00000002 r7:60000113 r6:eb3add8c r5:84a59800 r4:84a59800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a59800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ade08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854731c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a59800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafeb000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bc38c r4:854bc000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85467680 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3adfb0 to 0xeb3adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85473080 INFO: task kworker/1:563:4867 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 82be8000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 r4:82abf1e4 r4:00000000 r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018205 r8:84a5b000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1ef000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bd78c r4:854bd400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bd78c r4:85467700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a5b000 r8:8546772c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85467700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85467700 r8:8027ed34 r7:eb379e60 r6:85460f00 r5:84a5b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3b5fb0 to 0xeb3b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85473180 INFO: task kworker/1:564:4869 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 82be8000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb3bdd84 r8:00000002 r7:60000113 r6:eb3bdd8c r5:84a5a400 r4:84a5a400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a5a400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3bde08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85473440 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a5a400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb015000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bcb8c r4:854bc800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bcb8c r4:85467780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a5a400 r8:854677ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85467780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85467780 r8:8027ed34 r7:eb3b5e60 r6:85460f80 r5:84a5a400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd60: 80000013 ffffffff r4:00000000 r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 Exception stack(0xdff0dfb0 to 0xdff0dff8) r4:846ecd80 task:kworker/1:566 state:D stack:0 pid:4873 tgid:4873 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c5e08 [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85473580 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a58c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1d5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bcf8c r4:854bcc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bcf8c r4:85467800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a58c00 r8:8546782c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85467800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85467800 r8:8027ed34 r7:eb3b5e60 r6:85440f80 r5:84a58c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c5fb0 to 0xeb3c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85473280 INFO: task kworker/1:566:4873 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) r4:dff0ddc0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:567:4876 blocked for more than 476 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3cde08 r5:854bd38c r4:854bd000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:568:4877 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:568 state:D stack:0 pid:4877 tgid:4877 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb3d5d84 r8:00000002 r7:60000113 r6:eb3d5d8c r5:84a5c800 r4:84a5c800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a5c800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d5e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85473c00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a5c800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85467900 r8:8027ed34 r7:eb3b5e60 r6:85531000 r5:84a5c800 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85473780 INFO: task kworker/1:568:4877 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 83846000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xdff0dfb0 to 0xdff0dff8) r4:846ecd80 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85473880 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a5d400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb205000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bdb8c r4:854bd800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bdb8c r4:85467980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a5d400 r8:854679ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85467980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85467980 r8:8027ed34 r7:eb3d5e60 r6:85531080 r5:84a5d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3ddfb0 to 0xeb3ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854737c0 INFO: task kworker/1:569:4879 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:570:4881 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:570 state:D stack:0 pid:4881 tgid:4881 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb375d84 r8:00000002 r7:60000113 r6:eb375d8c r5:8548e000 r4:8548e000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8548e000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:00000000 r9:85467a00 r8:8027ed34 r7:eb3d5e60 r6:85467a80 r5:8548e000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854738c0 INFO: task kworker/1:570:4881 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 task:kworker/1:571 state:D stack:0 pid:4883 tgid:4883 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e1e08 [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 841f7000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:846ecd80 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e5e08 r10:61c88647 r9:8548c800 r8:85467c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 r4:00000000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:573:4887 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:573 state:D stack:0 pid:4887 tgid:4887 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb3e9d84 r8:00000002 r7:60000113 r6:eb3e9d8c r5:85489800 r4:85489800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85489800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e9e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85473ec0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85489800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb27f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854beb8c r4:854be800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:574:4890 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:574 state:D stack:0 pid:4890 tgid:4890 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb3edd84 r8:00000002 r7:60000013 r6:eb3edd8c r5:8548ec00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ede08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8548ec00 r8:85467e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85467e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85467e00 r8:8027ed34 r7:eb3e1e60 r6:85467e80 r5:8548ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3edfb0 to 0xeb3edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85471e80 INFO: task kworker/1:574:4890 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 848e6000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfa0: 00000000 00000000 00000000 00000000 [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:84a46c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 r7:ddde2d40 r6:83018200 r5:854bf38c r4:85467f00 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85471e80 INFO: task kworker/1:575:4891 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 84c17000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 r4:846ecd80 r10:829185c4 r9:eb3f9d84 r8:00000002 r7:60000013 r6:eb3f9d8c r5:853e6c00 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f9e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553c1c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:853e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb401000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bf78c r4:854bf400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bf78c r4:8553d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e6c00 r8:8553d02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8553d000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553d000 r8:8027ed34 r7:eb3ede60 r6:8553d080 r5:853e6c00 r4:00000001 Exception stack(0xeb3f9fb0 to 0xeb3f9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:577:4896 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:577 state:D stack:0 pid:4896 tgid:4896 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb405d84 r8:00000002 r7:60000113 r6:eb405d8c r5:853e4800 r4:853e4800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853e4800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb405e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553c300 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r5:854bfb8c r4:854bf800 r4:8553d100 r10:00000000 r9:8553d100 r8:8027ed34 r7:eb3ede60 r6:8553d180 r5:853e4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb405fb0 to 0xeb405ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8553c240 INFO: task kworker/1:577:4896 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 84f5b000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:578:4898 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:578 state:D stack:0 pid:4898 tgid:4898 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb419d84 r8:00000002 r7:60000013 r6:eb419d8c r5:85490000 r4:85490000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb419e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r7:ddde2d40 r6:83018200 r5:854c438c r4:8553d200 Exception stack(0xeb419fb0 to 0xeb419ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 r4:00000000 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:579:4900 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:579 state:D stack:0 pid:4900 tgid:4900 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb421d84 r8:00000002 r7:60000113 r6:eb421d8c r5:85491800 r4:85491800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85491800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb421e08 r4:00000000 [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:85491800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 r10:00000000 r9:8553d300 r8:8027ed34 r7:eb419e60 r6:8553d380 r5:85491800 task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:580:4903 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:580 state:D stack:0 pid:4903 tgid:4903 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r4:85493000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb43de08 [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:85493000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 r10:61c88647 r9:85493000 r8:8553d42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xeb43dfb0 to 0xeb43dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8553c940 INFO: task kworker/1:580:4903 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 8577d000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:846ecd80 task:kworker/0:310 state:D stack:0 pid:4904 tgid:4904 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb40de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552ec00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb439000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537338c r4:85373000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8537338c r4:85531100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f8c00 r8:8553112c r7:82804d40 r6:dddced40 r5:dddced60 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff0dd20 to 0xdff0dd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:311 state:D stack:0 pid:4906 tgid:4906 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb431e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8554fb00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae31000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85373b8c r4:85373800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85373b8c r4:85531200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f9800 r8:8553122c r7:82804d40 r6:dddced40 r5:dddced60 r4:85531200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85531200 r8:8027ed34 r7:eb35de60 r6:85531280 r5:854f9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb431fb0 to 0xeb431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8552ec40 INFO: task kworker/0:311:4906 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 85d59000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:581:4907 blocked for more than 476 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:581 state:D stack:0 pid:4907 tgid:4907 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb449d84 r8:00000002 r7:60000113 r6:eb449d8c r5:854fa400 r4:854fa400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854fa400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb449e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553cbc0 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8553c7c0 Call trace: dd20: 86326000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:582:4909 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:582 state:D stack:0 pid:4909 tgid:4909 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb45dd84 r8:00000002 r7:60000013 r6:eb45dd8c r5:854fbc00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb45de08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:854fbc00 r8:8553d5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 86644000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:583:4912 blocked for more than 477 seconds. r10:829185c4 r9:eb475d84 r8:00000002 r7:60000113 r6:eb475d8c r5:854fd400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb475e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8554a480 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:854fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e055b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c6b8c r4:854c6800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c6b8c r4:8553d680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854fd400 r8:8553d6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8553d680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553d680 r8:8027ed34 r7:eb421e60 r6:85531400 r5:854fd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80000013 ffffffff [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:584:4913 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:584 state:D stack:0 pid:4913 tgid:4913 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb479d84 r8:00000002 r7:60000013 r6:eb479d8c r5:854fc800 r4:854fc800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854fc800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb479e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553ce40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:854fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb469000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c578c r4:854c5400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c578c r4:8553d600 r10:61c88647 r9:854fc800 r8:8553d62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8553d600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553d600 r8:8027ed34 r7:eb475e60 r6:85531480 r5:854fc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb479fb0 to 0xeb479ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8553cd80 INFO: task kworker/1:584:4913 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 dd20: 86985000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:585 state:D stack:0 pid:4915 tgid:4915 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb489e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553c6c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:854fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb47f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c5b8c r4:854c5800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c5b8c r4:8553d700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854fb000 r8:8553d72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8553d700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553d700 r8:8027ed34 r7:eb475e60 r6:85531500 r5:854fb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb489fb0 to 0xeb489ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8553ce80 INFO: task kworker/1:585:4915 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 86e48000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb491e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8554a000 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:854fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb485000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c5f8c r4:854c5c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c5f8c r4:8553d780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854fe000 r8:8553d7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8553d780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553d780 r8:8027ed34 r7:eb475e60 r6:85531580 r5:854fe000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb491fb0 to 0xeb491ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8553c980 INFO: task kworker/1:586:4917 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 86e48000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:587 state:D stack:0 pid:4920 tgid:4920 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb445e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8554a140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85490c00 r7:00000000 r6:83018200 r5:00001000 r4:7f013000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa61000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c638c r4:854c6000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c638c r4:8553d800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85490c00 r8:8553d82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8553d800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553d800 r8:8027ed34 r7:eb475e60 r6:8553d880 r5:85490c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb445fb0 to 0xeb445ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8554a240 INFO: task kworker/1:587:4920 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 874e1000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 INFO: task kworker/1:588:4921 blocked for more than 477 seconds. [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb499e08 r4:00000000 r5:00001000 r4:dff33000 r7:ddde2d40 r6:83018200 r5:854c678c r4:8553d900 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8554a3c0 INFO: task kworker/1:588:4921 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 879db000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 INFO: task kworker/1:589:4924 blocked for more than 477 seconds. r4:85494800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a1e08 [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8553da00 r8:8027ed34 r7:eb475e60 r6:8553da80 r5:85494800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a1fb0 to 0xeb4a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8554a280 INFO: task kworker/1:589:4924 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 87b75000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:590:4926 blocked for more than 477 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ade08 [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:84a5e000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9c9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c738c r4:854c7000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c738c r4:8553db00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a5e000 r8:8553db2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8553db00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553db00 r8:8027ed34 r7:eb4a1e60 r6:85531600 r5:84a5e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4adfb0 to 0xeb4adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8554a500 INFO: task kworker/1:590:4926 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 88141000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:dff0ddc0 r4:00000000 r5:00001000 r4:dfdf3000 r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:591 state:D stack:0 pid:4928 tgid:4928 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b5e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8554aa00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:854f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead7f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c7b8c r4:854c7800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c7b8c r4:8553db80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f8000 r8:8553dbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8553db80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553db80 r8:8027ed34 r7:eb4ade60 r6:85531680 r5:854f8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b5fb0 to 0xeb4b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8554a640 INFO: task kworker/1:591:4928 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) dd20: 88710000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8554a8c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a80000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa77000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c778c r4:854c7400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c778c r4:8553dc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a80000 r8:8553dc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8553dc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553dc00 r8:8027ed34 r7:eb4b5e60 r6:85531700 r5:84a80000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b9fb0 to 0xeb4b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8554a640 INFO: task kworker/1:592:4929 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 88710000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:593 state:D stack:0 pid:4931 tgid:4931 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c1e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:84a81800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb03d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ccb8c r4:854cc800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854ccb8c r4:8553dc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a81800 r8:8553dcac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8553dc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553dc80 r8:8027ed34 r7:eb4b5e60 r6:85531780 r5:84a81800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c1fb0 to 0xeb4c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8554a880 INFO: task kworker/1:593:4931 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 88f24000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:594 state:D stack:0 pid:4934 tgid:4934 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c9e08 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8554aa80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a82400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadc3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c7f8c r4:854c7c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854c7f8c r4:8553dd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a82400 r8:8553ddac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8553dd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553dd80 r8:8027ed34 r7:eb4c1e60 r6:85531800 r5:84a82400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c9fb0 to 0xeb4c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8554ac40 INFO: task kworker/1:594:4934 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 8909d000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:595 state:D stack:0 pid:4937 tgid:4937 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb455e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8554ae40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85496c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf6b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854cc38c r4:854cc000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854cc38c r4:8553dd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85496c00 r8:8553dd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8553dd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553dd00 r8:8027ed34 r7:eb4c1e60 r6:8553de00 r5:85496c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb455fb0 to 0xeb455ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/1:595:4937 is blocked on a mutex likely owned by task kworker/0:86:3488. [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:312:4938 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:312 state:D stack:0 pid:4938 tgid:4938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb4a5d84 r8:00000002 r7:60000113 r6:eb4a5d8c r5:84a83000 r4:84a83000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a83000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a5e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8554f040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r5:844bd78c r4:844bd400 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd20: 89c6d000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:596:4942 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:596 state:D stack:0 pid:4942 tgid:4942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb4d5d84 r8:00000002 r7:60000113 r6:eb4d5d8c r5:84a85400 r4:84a85400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a85400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d5e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a85400 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb01d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854cc78c r4:854cc400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854cc78c r4:8553de80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a85400 r8:8553deac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8553de80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 8a05e000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8468f080 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:597 state:D stack:0 pid:4944 tgid:4944 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4cde08 r4:00000000 [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85561180 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85496000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb053000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ccf8c r4:854ccc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854ccf8c r4:8553df00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85496000 r8:8553df2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8553df00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553df00 r8:8027ed34 r7:eb4c1e60 r6:8553df80 r5:85496000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4cdfb0 to 0xeb4cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85561040 INFO: task kworker/1:597:4944 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 8a2bd000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:598:4945 blocked for more than 477 seconds. r5:85495400 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c5e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb07f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854cd38c r4:854cd000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854cd38c r4:85457f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85495400 r8:85457f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85457f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85457f00 r8:8027ed34 r7:eb4cde60 r6:85457f80 r5:85495400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c5fb0 to 0xeb4c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85561040 INFO: task kworker/1:598:4945 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 8a53e000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8468f080 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e1e08 r4:00000000 [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb0df000 r10:61c88647 r9:84a86000 r8:85531a2c r7:82804d40 r6:dddced40 r5:dddced60 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 8a93c000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:599:4949 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:599 state:D stack:0 pid:4949 tgid:4949 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb4e9d84 r8:00000002 r7:60000113 r6:eb4e9d8c r5:84a84800 r4:84a84800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a84800 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e9e08 [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 8ae04000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 r4:00000000 r5:00001000 r4:dfdf3000 r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:600:4950 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:600 state:D stack:0 pid:4950 tgid:4950 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb4e5d84 r8:00000002 r7:60000113 r6:eb4e5d8c r5:85498000 r4:85498000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85498000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e5e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85561f00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85498000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85561480 INFO: task kworker/1:600:4950 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 8b237000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:601 state:D stack:0 pid:4952 tgid:4952 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4dde08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:314:4955 blocked for more than 477 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:314 state:D stack:0 pid:4955 tgid:4955 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb4f5d84 r8:00000002 r7:60000113 r6:eb4f5d8c r5:8549b000 r4:8549b000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8549b000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f5e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848ccf00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8549b000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb111000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844bd38c r4:844bd000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:844bd38c r4:85531b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549b000 r8:85531bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85531b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85531b80 r8:8027ed34 r7:eb4a5e60 r6:85563280 r5:8549b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f5fb0 to 0xeb4f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8554f080 INFO: task kworker/0:314:4955 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 8b8f6000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:315:4956 blocked for more than 477 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:315 state:D stack:0 pid:4956 tgid:4956 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb4fdd84 r8:00000002 r7:60000113 r6:eb4fdd8c r5:8549bc00 r4:8549bc00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8549bc00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4fde08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85560e40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:8549bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e46e9000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8557878c r4:85578400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8557878c r4:85531c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549bc00 r8:85531c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85531c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85531c00 r8:8027ed34 r7:eb4f5e60 r6:85563300 r5:8549bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4fdfb0 to 0xeb4fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8554fd80 INFO: task kworker/0:315:4956 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 8bdf2000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r5:84746b8c r4:84746800 r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 r4:8468f080 r4:00000001 Exception stack(0xdff0dfb0 to 0xdff0dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:316:4957 blocked for more than 477 seconds. task:kworker/0:316 state:D stack:0 pid:4957 tgid:4957 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8549a400 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb501e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854cdb8c r4:854cd800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854cdb8c r4:85531c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549a400 r8:85531cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85531c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85531c80 r8:8027ed34 r7:eb4fde60 r6:85563380 r5:8549a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb501fb0 to 0xeb501ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8554fd80 INFO: task kworker/0:316:4957 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 8c09f000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:317:4960 blocked for more than 478 seconds. r4:84a86c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d9e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:602:4962 blocked for more than 478 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:602 state:D stack:0 pid:4962 tgid:4962 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85561dc0 r4:85563480 dfa0: 00000000 00000000 00000000 00000000 r4:85561b00 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 8cc04000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:603:4963 blocked for more than 478 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:603 state:D stack:0 pid:4963 tgid:4963 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb509d84 r8:00000002 r7:60000013 r6:eb509d8c r5:84a80c00 r4:84a80c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a80c00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb509e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85561ac0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a80c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2b3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854cef8c r4:854cec00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854cef8c r4:85563500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a80c00 r8:8556352c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85563500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85563500 r8:8027ed34 r7:eb4e5e60 r6:85531e80 r5:84a80c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb509fb0 to 0xeb509ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85561bc0 INFO: task kworker/1:603:4963 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 8d036000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 r5:84746b8c r4:84746800 r4:8468f080 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb515e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85561f80 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:84a5ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb299000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ceb8c r4:854ce800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854ceb8c r4:85563580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a5ec00 r8:855635ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85563580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85563580 r8:8027ed34 r7:eb509e60 r6:85531f00 r5:84a5ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb515fb0 to 0xeb515ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85561fc0 INFO: task kworker/1:604:4967 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 8d036000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdff0dfb0 to 0xdff0dff8) INFO: task kworker/1:605:4969 blocked for more than 478 seconds. r5:854a0c00 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb51de08 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb325000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d438c r4:854d4000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854d438c r4:85563600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a0c00 r8:8556362c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85563600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85563600 r8:8027ed34 r7:eb509e60 r6:85531f80 r5:854a0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb51dfb0 to 0xeb51dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855617c0 INFO: task kworker/1:605:4969 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 8d41f000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:606:4970 blocked for more than 478 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:606 state:D stack:0 pid:4970 tgid:4970 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb521d84 r8:00000002 r7:60000113 r6:eb521d8c r5:854a1800 r4:854a1800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854a1800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb521e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8554af00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:854a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2bd000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854cf38c r4:854cf000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854cf38c r4:85563680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a1800 r8:855636ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85563680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85563680 r8:8027ed34 r7:eb51de60 r6:855a5000 r5:854a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb521fb0 to 0xeb521ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8554afc0 INFO: task kworker/1:606:4970 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:607 state:D stack:0 pid:4972 tgid:4972 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb529e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85563700 r8:8027ed34 r7:eb51de60 r6:855a5080 r5:854a3000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:608:4974 blocked for more than 478 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:608 state:D stack:0 pid:4974 tgid:4974 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb531d84 r8:00000002 r7:60000013 r6:eb531d8c r5:854a2400 r4:854a2400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854a2400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb531e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85567140 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:854a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb305000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854cfb8c r4:854cf800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/1:609:4976 blocked for more than 478 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb505e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85567280 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:85499800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb317000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854cff8c r4:854cfc00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854cff8c r4:85563800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85499800 r8:8556382c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85563800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85563800 r8:8027ed34 r7:eb51de60 r6:85563880 r5:85499800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:609:4976 is blocked on a mutex likely owned by task kworker/0:86:3488. r4:00000000 r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85567680 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8549e000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb333000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d478c r4:854d4400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8549e000 r8:8556392c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855673c0 r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8549ec00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb50de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854685c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018205 r8:8549ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0381000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d638c r4:854d6000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854d638c r4:85563a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549ec00 r8:85563a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85563a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85563a00 r8:8027ed34 r7:eb539e60 r6:85563a80 r5:8549ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb50dfb0 to 0xeb50dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855673c0 INFO: task kworker/1:611:4980 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:8468f080 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:612:4982 blocked for more than 478 seconds. Workqueue: events bpf_prog_free_deferred [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb541e08 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb635000 r5:854d5f8c r4:854d5c00 r4:85563b00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:318:4987 blocked for more than 478 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:318 state:D stack:0 pid:4987 tgid:4987 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb535d84 r8:00000002 r7:60000113 r6:eb535d8c r5:854a0000 r4:854a0000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854a0000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb535e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855607c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad5000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85578f8c r4:85578c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85578f8c r4:855a5200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a0000 r8:855a522c r7:82804d40 r6:dddced40 r5:dddced60 r4:855a5200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a5200 r8:8027ed34 r7:eb4fde60 r6:855a5280 r5:854a0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb535fb0 to 0xeb535ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:854a5400 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb37de08 r9:83018005 r8:854a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 r10:61c88647 r9:854a5400 r8:855a532c r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85560f00 INFO: task kworker/0:319:4988 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 9024b000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:320:4991 blocked for more than 478 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:320 state:D stack:0 pid:4991 tgid:4991 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb3d9d84 r8:00000002 r7:60000113 r6:eb3d9d8c r5:854a6000 r4:854a6000 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854a6000 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d9e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85566040 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabd3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8557978c r4:85579400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8557978c r4:855a5400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a6000 r8:855a542c r7:82804d40 r6:dddced40 r5:dddced60 r4:855a5400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a5400 r8:8027ed34 r7:eb535e60 r6:855a5480 r5:854a6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3d9fb0 to 0xeb3d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85560ac0 INFO: task kworker/0:320:4991 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 908bc000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:321:4992 blocked for more than 478 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:321 state:D stack:0 pid:4992 tgid:4992 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb461d84 r8:00000002 r7:60000113 r6:eb461d8c r5:854a6c00 r4:854a6c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854a6c00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb461e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85560400 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab61000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8557938c r4:85579000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8557938c r4:855a5500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a6c00 r8:855a552c r7:82804d40 r6:dddced40 r5:dddced60 r4:855a5500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a5500 r8:8027ed34 r7:eb3d9e60 r6:855a5580 r5:854a6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb461fb0 to 0xeb461ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85560ac0 INFO: task kworker/0:321:4992 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 909d1000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:322 state:D stack:0 pid:4995 tgid:4995 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb46dd84 r8:00000002 r7:60000113 r6:eb46dd8c r5:854a4800 r4:854a4800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854a4800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb46de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855661c0 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:854a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae7d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85579b8c r4:85579800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85579b8c r4:855a5600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a4800 r8:855a562c r7:82804d40 r6:dddced40 r5:dddced60 r4:855a5600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a5600 r8:8027ed34 r7:eb3d9e60 r6:855a5680 r5:854a4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb46dfb0 to 0xeb46dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85566000 INFO: task kworker/0:322:4995 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd20: 90c7f000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:323 state:D stack:0 pid:4997 tgid:4997 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:855662c0 INFO: task kworker/0:323:4997 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 90ffb000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:613:4998 blocked for more than 478 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:613 state:D stack:0 pid:4998 tgid:4998 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb3f1d84 r8:00000002 r7:60000113 r6:eb3f1d8c r5:84a70000 r4:84a70000 r5:84a70000 r4:829185c0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f1e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85567e00 [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85563b80 r8:8027ed34 r7:eb50de60 r6:855a5800 r5:84a70000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 dd20: 91296000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 r4:dff0ddc0 r4:00000000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:324:5000 blocked for more than 478 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:324 state:D stack:0 pid:5000 tgid:5000 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb54dd84 r8:00000002 r7:60000113 r6:eb54dd8c r5:84a70c00 r4:84a70c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a70c00 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb54de08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85566380 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf23000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85579f8c r4:85579c00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85579f8c r4:855a5880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a70c00 r8:855a58ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855a5880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a5880 r8:8027ed34 r7:eb549e60 r6:855a5900 r5:84a70c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb54dfb0 to 0xeb54dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred dd20: 913b4000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 r4:00000000 r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:325:5002 blocked for more than 478 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:325 state:D stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb551d84 r8:00000002 r7:60000013 r6:eb551d8c r5:84a71800 r4:84a71800 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a71800 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb551e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85566780 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a71800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb00b000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8557a78c r4:8557a400 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8557a78c r4:855a5980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a71800 r8:855a59ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855a5980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a5980 r8:8027ed34 r7:eb54de60 r6:855a5a00 r5:84a71800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb551fb0 to 0xeb551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85566340 INFO: task kworker/0:325:5002 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 917a4000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:326:5003 blocked for more than 478 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:326 state:D stack:0 pid:5003 tgid:5003 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb559d84 r8:00000002 r7:60000013 r6:eb559d8c r5:84a72400 r4:84a72400 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a72400 r4:829185c0 [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb559e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85566580 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a72400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf4d000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8557a38c r4:8557a000 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8557a38c r4:855a5a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a72400 r8:855a5aac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 91bdb000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:327:5006 blocked for more than 478 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:327 state:D stack:0 pid:5006 tgid:5006 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a289f0>] (schedule_preempt_disabled) from [<81a2b0ec>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a2adec>] (__mutex_lock.constprop.0) from [<81a2b5b8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb555e08 r4:00000000 [<81a2b5a4>] (__mutex_lock_slowpath) from [<81a2b5f8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a2b5bc>] (mutex_lock) from [<804e4f74>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85566f00 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a73000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb23f000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8557af8c r4:8557ac00 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8557af8c r4:855a5b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a73000 r8:855a5bac r7:82804d40 r6:dddced40 r5:dddced60 r4:855a5b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a5b80 r8:8027ed34 r7:eb551e60 r6:855a5c00 r5:84a73000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb555fb0 to 0xeb555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85566740 INFO: task kworker/0:327:5006 is blocked on a mutex likely owned by task kworker/0:86:3488. task:kworker/0:86 state:R running task stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28a54>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84a9c800 r8:80200be4 r7:dff0dd54 r6:ffffffff r5:84a9c800 r4:00000000 [<81a28a14>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff0dd20 to 0xdff0dd68) dd20: 91e18000 dfdd5000 00000001 80239bb8 7f271000 00000001 82abf1c4 82abe5a0 dd40: 7f271000 dfdd5000 8280c9b4 dff0dd9c dff0dda0 dff0dd70 80230af4 80239bd0 dd60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4d38>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82abf1e4 [<804e4ab4>] (__purge_vmap_area_lazy) from [<804e50f0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff0ddc0 r5:dff0de08 r4:dff0ddc0 [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f0c>] (_vm_unmap_aliases) from [<804e8e64>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ecf40 r4:00000000 [<804e8cf8>] (vfree) from [<8054e8e4>] (execmem_free+0x30/0x50 mm/execmem.c:399) r9:83018005 r8:84a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054e8b4>] (execmem_free) from [<803c6b80>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6b70>] (bpf_jit_free_exec) from [<803c6f60>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c6ef8>] (bpf_jit_free) from [<803c7ff0>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746b8c r4:84746800 [<803c7ea4>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746b8c r4:8468f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9c800 r8:8468f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8468f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8468f080 r8:8027ed34 r7:dff01e60 r6:848c5c00 r5:84a9c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff0dfb0 to 0xdff0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:846ecd80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:328:5007 blocked for more than 478 seconds. Not tainted 6.16.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:328 state:D stack:0 pid:5007 tgid:5007 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a27698>] (__schedule) from [<81a28620>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a27698>] (__schedule) from [<81a28620>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829185c4 r9:eb55dd84 r8:00000002 r7:60000013 r6:eb55dd8c r5:84a73c00 r4:84a73c00 [<81a285f4>] (schedule) from [<81a28a08>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a73c00 r4:829185c0